| [ Team LiB ] |
|
Chapter 5. Symmetric EncryptionThis chapter discusses the basics of symmetric encryption algorithms. Message integrity checking and hash functions are covered in Chapter 6. The use of cryptography on a network is discussed in Chapter 9.
|
| [ Team LiB ] |
|