Blockchain Cryptography: Part 2
Daniel Hellwig (),
Goran Karlic () and
Arnd Huchzermeier ()
Additional contact information
Daniel Hellwig: Kepler Cannon
Goran Karlic: Kepler Cannon
Arnd Huchzermeier: WHU—Otto Beisheim School of Management
Chapter Chapter 7 in Build Your Own Blockchain, 2020, pp 149-170 from Springer
Abstract:
Abstract Chapter 6 introduced the concept of symmetric cryptography. As the name suggests, a symmetric encryptionSymmetric encryption scheme uses the same key for both encryption and decryption; the key is known to the sender and recipient of the message but must remain unknown to anyone else. To communicate secretly, a sender uses an invertible cryptographic function to encrypt a plaintextPlaintext m with the key k and then sends the resulting ciphertext c to the recipient.
Date: 2020
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:mgmchp:978-3-030-40142-9_7
Ordering information: This item can be ordered from
http://www.springer.com/9783030401429
DOI: 10.1007/978-3-030-40142-9_7
Access Statistics for this chapter
More chapters in Management for Professionals from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().