An introduction to cryptography and public key infrastructure


Alex Wood (Red Hat)


We call any cipher that uses the same key to both encrypt and decrypt a symmetric cipher. Symmetric ciphers are divided into stream ciphers and block ciphers. Our XOR cipher is a stream cipher, for example. These ciphers use two keys: a public key and a private key. He decrypts the ciphertext with his private key and uses the symmetric key Alice sent him to communicate with her confidentially using HMACs with each message to ensure integrity.


Visit Link


Tags: