19

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 15:37, 3 April 2007 by Mdpeters (talk | contribs) (New page: ==Footnote 19== In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Footnote 19

In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and to "decrypt" it from ciphertext back to plaintext.