Conventional cryptographic primitives

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Modern network security systems contain cryptographic primitives as an essential building block. In this chapter, we discuss conventional cryptographic primitives, which are also known as symmetric primitives. The term symmetric stems from the fact that in order to use conventional primitives, all parties need to share the same set of secret keys. Hence, all parties have the same capabilities. This is not the case with asymmetric primitives, where some keys are known to one party only. © 2010 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Rijmen, V. (2010). Conventional cryptographic primitives. In Network Security (pp. 207–227). Springer US. https://doi.org/10.1007/978-0-387-73821-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free