ABSTRACT

In this chapter the many facets and ramifications of symmetric key cryptography will be discussed. Specifically, the topic that will be addressed is symmetric key ciphers, of which there are two forms: (1) block ciphers and (2) stream ciphers. These ciphers will be used to ensure confidentiality between two parties that share a secret key.