Professional Documents
Culture Documents
Summary of Encryption
• Last 3 lectures – we’ve looked at the 2 basic
methods of encryption
• Secret key encryption: Sender & receiver have the
same key, used for both encryption & decryption
• Encryption & decryption algorithms are inverse
• Examples: Caesar’s & affine ciphers, DES
• Secret key algorithms are usually efficient (quick
to implement), so are good for long messages
• However, each pair of users needs a different key
– so management of the many keys is an issue
• Also, how does the sender securely inform the
receiver what the key is? 1
1
Discrete Mathematics 2002 Lecture 38, 24-October-2002
2
Discrete Mathematics 2002 Lecture 38, 24-October-2002
3
Discrete Mathematics 2002 Lecture 38, 24-October-2002