: Uses a single shared secret key for both encryption and decryption. Examples include the Advanced Encryption Standard (AES) and DES .
: Implementation of secure exchange systems using identification and commitment schemes. Future and Advanced Topics Advanced editions of the textbook also cover: Introduction to Cryptography: Principles and Ap...
: Preparing for the threat of quantum computing, which could potentially break current RSA and ECC algorithms. : Uses a single shared secret key for
: Uses a pair of mathematically related keys: a public key for encryption and a private key for decryption. Common algorithms include RSA , DSA , and Elliptic Curve Cryptography (ECC) . and Elliptic Curve Cryptography (ECC) .