Conventional Encryption Model
This is a mind map that contains information about the conventional encryption model.
Tags:
Similar Mind Maps
Outline

Conventional Encryption Model

Public key
Application for publickeycryptosystem

Examples of publickey cryptosystem

Cryptographic attack methoods
Adaptive chosen plaintext
Adaptive chose ciphertext

Man in the middle attack
make it seem that two computers arecommunication with each other.

conventional encryption algorithm
Source use of symmetric encryption
A strong encryption algorihm
A secret key known only to sender/reciver