Security and Cryptography
Security and Cryptography
Security and Cryptography
• Symmetric Cryptosystems
o A public-key cryptosystem uses one key (public-key) for encryption and another key (private-key) for
decryption. Each user is assigned a pair of unique and mathematically related keys: a public key and a
private key.
o The private key is a secret key that is available only to the owner, and the public key i s published.
References:
Forouzan, B. (2013). Data communications and network. McGraw-Hill.
Ibe, O. (2018). Fundamentals of data communication networks (1 st ed.). Wiley & Sons, Inc.
Simply Explained. (2017, October 30). Asymmetric Encryption – Simply explained [Video]. YouTube.
https://www.youtube.com/watch?v=AQDCe585Lnc