The cryptography algorithms can be categorized as symmetric key cryptography
and asymmetric key cryptography.
Cryptography is divided into two vital types: one is Symmetric key cryptography
, and other is Asymmetric key cryptography.
In this paper, we propose a secure and highly efficient deduplicatable proof of storage scheme based on symmetric key cryptography
, namely Sec-DPoS, which ensures data confidentiality with brute-force attack resilience and supports integrity auditing based on symmetric key cryptography
Therefore, more sophisticated methods were designed to assure various levels of security, these methods are categorized as: Symmetric Key Cryptography
(SKC) and Public Key Cryptography (PKC).
Among the topics are symmetric key cryptography
, block ciphering, secure hashing, public key cryptosystems that underpin various internet standards, physically unclonable functions, random number generators, and side channel attacks.
Symmetric key cryptography
consists of a private key that is used for both encryption and decryption.
Cryptography can be broadly classified as Symmetric Key Cryptography
(SKC) and Asymmetric Key Cryptography (AKC).
Based on symmetric key cryptography
and one way hash function, Song  suggested an efficient smart card authentication scheme and claimed that the scheme is secure against impersonation attack, parallel session attack, replay attack and modification attack.