Use Cases

Self-protection With Key K

  • Alice encrypts plaintext P with key K.

    • A:C = {P}k

  • Alice decrypts cryptogram C with key K.

    • A:P' = {C}k

  • P' should be equal to P (requires checking).

Secure communication with key K

  • Alice encrypts plaintext P with key K.

    • A:C = {P}k

  • Bob decrypts C with key K.

    • B:P' = {C}k

  • P' should be equal to P (requires checking).

Last updated