Encryption techniques can use either public-keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) and a popular public-key technique is RSA (named after its inventors, Rivest, Shamir and Adleman).




Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media Dordrecht 1999

Authors and Affiliations

  • Bill Buchanan
    • 1
  1. 1.Napier UniversityScotland

Personalised recommendations