Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Symmetric cryptography

Methods, Implementation, and Application of Cyber Security Intelligence and Analytics
Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Published in Chapter:
The Fifth and the Sixth Order Gopala Hemachandra Representations and the Use of These Representations in Symmetric Cryptography
Çağla Çelemoğlu (Ondokuz Mayis University, Turkey) and Ayşe Nalli (Karabük University, Turkey)
DOI: 10.4018/978-1-6684-3991-3.ch007
Abstract
We all know that every positive integer has a unique Fibonacci representation, but some positive integers have multiple Gopala Hemachandra (GH) representations, or some positive integers haven't any GH representation. Here, the authors found the first k-positive integer k=(3 2^((m-1))-1) for which there is no Zeckendorf's representation for Gopala Hemachandra sequence whose order m. Thus, the authors formulated the first positive integer whose Zeckendorf's representation can't be found in terms of its order. The authors also described the fourth, the fifth, and the sixth order GH representation of positive integers and obtained the fifth and the sixth order GH representations of the first 26 positive integers uniformly according to a certain rule with a table. Finally, the authors used these GH representations in symmetric cryptography, and the authors made some applications with a method which they construct similar to Nalli and Ozyilmaz.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security-Based Knowledge Management
A technique using the same secret key to encrypt and decrypt a message. Also called secret-key cryptography or conventional cryptography.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks
The encryption key is closely related or identical to the decryption key. In practice, keys represent a shared secret between two or more parties that can be used to maintain private communication.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing Protocols for Wireless Adhoc Networks
Also called private key encryption algorithm since only a secret key is required between the sender and the receiver of a message.
Full Text Chapter Download: US $37.50 Add to Cart
Securing Over-the-Air Code Updates in Wireless Sensor Networks
Symmetric cryptography is based on the use of just one key. This key is used for both encryption and decryption and is shared with all entities. Common algorithms are AES (advanced encryption standard), DES (data encryption standard), and triple-DES.
Full Text Chapter Download: US $37.50 Add to Cart
A Pervasive Polling Secret-Sharing Based Access Control Protocol for Sensitive Information
A cryptographic paradigm in which the same key is used to encrypt and decrypt information.
Full Text Chapter Download: US $37.50 Add to Cart
Sustainability of Public Key Cryptosystem in Quantum Computing Paradigm
Also known as secret key encryption, only one key called secret key is used for both encryption and decryption.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR