From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 12:37, 16 October 2014 by Mdpeters (talk | contribs) (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Footnote 19

In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and to "decrypt" it from ciphertext back to plaintext.