What are the two requirements for secure use?
- Sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key secure
Processes the input one block of elements at a time
Produces an output block for each input block
Can reuse keys
More common
Block Cipher
Processes the input elements continuously
Produces output one element at a time
Primary advantage is that they are almost always faster and use far less code
Encrypts plaintext one byte at a time
Pseudorandom stream is one that is unpredictable without knowledge of the input key
Stream Cipher
What is the purpose of Message Authentication.