Skip to main content

Public Key Versus Secret Key Encryption

  • Reference work entry
Encyclopedia of Multimedia
  • 102 Accesses

Definition

The purpose of a key in encryption systems is to ensure privacy by keeping information hidden from whom it is not intended. There are two types of encryption systems: secret-key and public-key systems.

Encryption is the transformation of data, the plaintext, into a form that is as close to impossible as possible to read, the ciphetext, without the appropriate knowledge (a key). Its purpose is to ensure privacy by keeping information hidden from anyone for whom it is not intended, even those who have access to the encrypted data, the ciphetext [1].

There are two types of encryption systems: secret-key and public-key systems (see Fig. 1). In secret-key encryption, also referred to as symmetric cryptography, the same key is used for both encryption and decryption. The most popular secret-key cryptosystem in use today is the Data Encryption Standard (DES, see [13]). In general, the security of a secret-key system depends on the strength of the algorithm and the length of the...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. RSA Laboratories, “RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1,” RSA Security Inc., 2000.

    Google Scholar 

  2. B. Schneier, “Applied Cryptography,” 2nd Ed., Wiley, New York, 1996.

    Google Scholar 

  3. R.K. Nichols, “ICSA guide to cryptography,” McGraw-Hill, New York, 1999.

    Google Scholar 

Download references

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag

About this entry

Cite this entry

(2008). Public Key Versus Secret Key Encryption. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-78414-4_188

Download citation

Publish with us

Policies and ethics