In *Encyclopedia of Multimedia*, pages 745–746. Springer US, 2008. 00000

Paper abstract bibtex

Paper abstract bibtex

DefinitionThe purpose of a key in encryption systems is to ensure privacy by keeping information hidden from whom it is not intended. There are two types of encryption systems: secret-key and public-key systems.Encryption is the transformation of data, the plaintext, into a form that is as close to impossible as possible to read, the ciphetext, without the appropriate knowledge (a key). Its purpose is to ensure privacy by keeping information hidden from anyone for whom it is not intended, even those who have access to the encrypted data, the ciphetext [1].There are two types of encryption systems: secret-key and public-key systems (see Fig. 1). In secret-key encryption, also referred to as symmetric cryptography, the same key is used for both encryption and decryption. The most popular secret-key cryptosystem in use today is the Data Encryption Standard (DES, see [1–3]). In general, the security of a secret-key system depends on the strength of the algorithm and the length of ...

@incollection{furht_public_2008, title = {Public {Key} {Versus} {Secret} {Key} {Encryption}}, copyright = {©2008 Springer-Verlag}, isbn = {978-0-387-74724-8 978-0-387-78414-4}, url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_188}, abstract = {DefinitionThe purpose of a key in encryption systems is to ensure privacy by keeping information hidden from whom it is not intended. There are two types of encryption systems: secret-key and public-key systems.Encryption is the transformation of data, the plaintext, into a form that is as close to impossible as possible to read, the ciphetext, without the appropriate knowledge (a key). Its purpose is to ensure privacy by keeping information hidden from anyone for whom it is not intended, even those who have access to the encrypted data, the ciphetext [1].There are two types of encryption systems: secret-key and public-key systems (see Fig. 1). In secret-key encryption, also referred to as symmetric cryptography, the same key is used for both encryption and decryption. The most popular secret-key cryptosystem in use today is the Data Encryption Standard (DES, see [1–3]). In general, the security of a secret-key system depends on the strength of the algorithm and the length of ...}, language = {en}, urldate = {2016-05-03}, booktitle = {Encyclopedia of {Multimedia}}, publisher = {Springer US}, editor = {Furht, Borko}, year = {2008}, note = {00000}, pages = {745--746} }

Downloads: 0