19

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Footnote 19

In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and to "decrypt" it from ciphertext back to plaintext.