Loading...
Please wait, while we are loading the content...
Similar Documents
Symmetric Key Ciphers and Wireless LAN Security
| Content Provider | Scilit |
|---|---|
| Author | Wu, Chwan-Hwa (John) Irwin, J. David |
| Copyright Year | 2016 |
| Description | In this chapter the many facets and ramifications of symmetric key cryptography will be discussed. Specifically, the topic that will be addressed is symmetric key ciphers, of which there are two forms: (1) block ciphers and (2) stream ciphers. These ciphers will be used to ensure confidentiality between two parties that share a secret key. Book Name: Introduction to Computer Networks and Cybersecurity |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2012-0-07710-9&isbn=9780429101311&doi=10.1201/9781466572140-30&format=pdf |
| DOI | 10.1201/9781466572140-30 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2016-04-19 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Introduction To Computer Networks and Cybersecurity Hardware and Architecturee Parties Cryptography Wireless Secret Ramifications Key Ciphers |
| Content Type | Text |
| Resource Type | Chapter |