Symmetric and asymmetric encryption

2Citations
Citations of this article
74Readers
Mendeley users who have this article in their library.

Abstract

All cryptosystems currently in use are symmetric in the sense that they require the transmitter and receiver to share, in secret, either the same piece of information (key) or one of a pair of related keys easily computed from each other; the key is used in the encryption process to introduce uncertainty to an unauthorized receiver. Not only is an asymmetric encryption system one in which the transmitter and receiver keys are different, but in addition it is computationally infeas-ible to compute at least one from the other. Asymmetric systems make it possible to authenticate messages whose contents must be revealed to an opponent or allow a transmitter whose key has been compromised to communicate in privacy to a receiver whose key has been kept secret - neither of which is possible using a symmetric cryptosystem. This paper opens with a brief discussion of encryption principles and then proceeds to a comprehensive discussion of the asymmetric encryption/decryption channel and its application in secure communications.

Cite

CITATION STYLE

APA

Simmons, G. J. (2019). Symmetric and asymmetric encryption. In Secure Communications and Asymmetric Cryptosystems (pp. 241–298). Taylor and Francis. https://doi.org/10.36074/05.06.2020.v3.36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free