Abstract

Encryption techniques can use either public-keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) and a popular public-key technique is RSA (named after its inventors, Rivest, Shamir and Adleman).

Keywords

Assure 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media Dordrecht 1999

Authors and Affiliations

  • Bill Buchanan
    • 1
  1. 1.Napier UniversityScotland

Personalised recommendations