19: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(New page: ==Footnote 19== In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and...)
 
m (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
 
(4 intermediate revisions by one other user not shown)
(No difference)

Latest revision as of 12:37, 16 October 2014

Footnote 19

In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and to "decrypt" it from ciphertext back to plaintext.