19

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

Footnote 19

In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and to "decrypt" it from ciphertext back to plaintext.