Security of symmetric algorithms rely on "obscuring" keys, correct? They use "secret" keys.
Asked
Active
Viewed 162 times
Security of symmetric algorithms rely on "obscuring" keys, correct? They use "secret" keys.