What is secret key cryptography?
The art of cryptography or communication in code can be divided into three wide categories: cryptography of public key, a code that uses one key for encryption and a separate key for decryption; Hash function that rely on mathematical conversions to permanent information encryption; And secret key cryptography, a code that uses the same key for both encryption and for decryption of transmitted data. The last category derives its name from the fact that both the sender and the receiver must maintain the key secret to prevent successful reporting of the message third party.
Secret key cryptography, also known as symmetrical encryption, can be divided into two main types based on the type of coding scheme used. For example, Stream ciphers allow the sender and receivers to constantly update and change the secret key; Block the ciphers on the other side consistently code one block of data at once. In addition, the Synchronization of the Ream stšifra leaves the previous data volume, unlike SyncHroner jet ciphers that develop a key that is independent of the volume and progression of the message.
There are four main modes of secret key cryptographic block operations ciphers. Electronic code mode (ECB) corresponds to the most basic level of encryption; CHIFR (CBC) chaining includes the sender's feedback to the ECB equation; Cipher feedback (CFB) allows data encryption at a much smaller character level; And output feedback (off) uses an even more complex, independent coding algorithm to prevent two data from coding in the same way.
Overall, secret key cryptography is a mathematical paradise that is able to be more complex both the complexities of the control algorithm and the frequency with which this algorithm or key changes. One Eryday evaplication, which uses secret key cryptography, is the ongoing transmission of paid television content to a cable or satellite subscriber. AsThe piracy of these signals has also increased, and it also has to constantly update the efforts of cable and satellite companies and download the new De-SCRAMBLING keys to smart cards inside each receiver.
The complex form of secret key cryptography was used to protect the Cold War era, which directly connected the White House and the Kremlin. Known as a disposable pad (OTP), it generated a very large set of random numbers, which is used only once as a decoder key. This type of encryption is considered to be impossible to break the correct use.