Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Key (cryptography)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Purpose == Since the key protects the confidentiality and integrity of the system, it is important to be kept secret from unauthorized parties. With public key cryptography, only the private key must be kept secret, but with symmetric cryptography, it is important to maintain the confidentiality of the key. [[Kerckhoffs's principle|Kerckhoff's principle]] states that the entire security of the cryptographic system relies on the secrecy of the key.<ref>{{Cite book|last1=Mrdovic|first1=S.|last2=Perunicic|first2=B.|title=Networks 2008 - the 13th International Telecommunications Network Strategy and Planning Symposium |chapter=Kerckhoffs' principle for intrusion detection |date=September 2008|chapter-url=https://ieeexplore.ieee.org/document/6231360|volume=Supplement|pages=1β8|doi=10.1109/NETWKS.2008.6231360|isbn=978-963-8111-68-5 }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)