Modern network security systems contain cryptographic primitives as an essential building block. In this chapter, we discuss conventional cryptographic primitives, which are also known as symmetric primitives. The term symmetric stems from the fact that in order to use conventional primitives, all parties need to share the same set of secret keys. Hence, all parties have the same capabilities. This is not the case with asymmetric primitives, where some keys are known to one party only. © 2010 Springer Science+Business Media, LLC.
CITATION STYLE
Rijmen, V. (2010). Conventional cryptographic primitives. In Network Security (pp. 207–227). Springer US. https://doi.org/10.1007/978-0-387-73821-5_9
Mendeley helps you to discover research relevant for your work.