␡
- Introduction
- Background
- Basic XOR
- About the Key Space
- Common Secret Key Algorithms
- Security Services of Secret Key Encryption
- Secret Key Cryptography and Nonrepudiation
- Origin Authenticity
- Data Integrity
This chapter is from the book
Secret Key Cryptography and Nonrepudiation
Secret key cryptography alone is not sufficient to prevent the denial of an action that has taken place such as the initiation of an electronic transaction. Despite the fact that one can apply data confidentiality between two communicating entities, the fundamental flaw of a nonrepudiation scheme that is based on secret key cryptography alone is inherent to the fact that the secret key is dispensed to more than one party.