Chapter 6

Symmetric-Key Operations

Recall that the RC4 algorithm of the “Introductory Example” on page 9 is called symmetric-key encryption because the encryption key used is the same the decryption key. Crypto-C offers two types of symmetric-key encryption operations: stream ciphers and block ciphers. The RC4 cipher, the only stream cipher in Crypto-C, was used in the “Introductory Example” on page 9. This chapter gives examples of the RC2, RC5, RC6 and DES block ciphers.

For an example of public-key encryption, see “Performing RSA Operations” on page 214.

1 7 7

Page 199
Image 199
RSA Security 5.2.2 manual Symmetric-Key Operations