From ce6d28020cba8bc87949231e9a0b5a5911a4343d Mon Sep 17 00:00:00 2001 From: "Tammi L. Coles" Date: Thu, 12 Oct 2023 16:49:51 +0200 Subject: [PATCH] weave in asymmetric cryptography formerly in ch3 as symm-key explainer --- book/source/03-cryptography.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/book/source/03-cryptography.md b/book/source/03-cryptography.md index 788eae5..4c9fd57 100644 --- a/book/source/03-cryptography.md +++ b/book/source/03-cryptography.md @@ -19,7 +19,7 @@ Here are two important properties of cryptographic hash functions: ## Symmetric-key cryptography -[Symmetric-key cryptography](https://en.wikipedia.org/wiki/Symmetric-key_algorithm) uses the same cryptographic key for both encryption and decryption. Symmetric-key cryptographic systems support *encryption/decryption* operations. +[Symmetric-key cryptography](https://en.wikipedia.org/wiki/Symmetric-key_algorithm) uses the same cryptographic key for both encryption and decryption, unlike asymmetric cryptography where a pair of keys is used: a public key for encryption and a corresponding private key for decryption. Symmetric-key cryptographic systems support *encryption/decryption* operations. Participants in symmetric-key operations need to exchange the shared secret over a secure channel.