Based on the fact that only sender and receiver know the secret key. A simple example of a secret-key encryption:
The XOR algorithm is a polyalphabetic substitution cipher. Considered a weak algorithm as there are methods to derive the key and the clear text from the encrypted text. Copyright 1997 by Slackers Union. Comments should go to any of the group members. Opinions reflected on this page are by no means opinions of UCSD. Go sue somebody else. Last Modified: June 1, 1997 |