Site home page
Get alerts when Linktionary is updated
Book updates and addendums
Get info about the Encyclopedia of Networking and Telecommunicatons, 3rd edition (2001)
Download the electronic version of the Encyclopedia of Networking, 2nd edition (1996). It's free!
Contribute to this site
Electronic licensing info
Note: Many topics at this site are reduced versions of the text in "The Encyclopedia of Networking and Telecommunications." Search results will not be as extensive as a search of the book's CD-ROM.
Secret-key encryption uses one key, the secret key, that is used to both encrypt and decrypt messages. This is also called symmetric encryption. The term "private key" is often used inappropriately to refer to the secret key. Refer to "Secret-Key Cryptography."
With public-key encryption, a user has two keys, one that is made public and one that is held privately. This is asymmetric encryption. Refer to "Public-Key Cryptography."
Copyright (c) 2001 Tom Sheldon and Big Sur Multimedia.