Symmetric-key algorithm
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption (also known as asymmetric-key encryption). However, symmetric-key encryption algorithms are usually better for bulk encryption. They have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key enc
- Abstraction100002137
- Act100030358
- Activity100407535
- Algorithm105847438
- Cipher106254239
- Communication100033020
- Event100029378
- Message106253690
- Procedure101023820
- PsychologicalFeature100023100
- Rule105846932
- Thing
- WikicatAlgorithms
- WikicatCiphers
- WikicatCryptographicAlgorithms
- YagoPermanentlyLocatedEntity
- Comment
- enSymmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption (also known as asymmetric-key encryption). However, symmetric-key encryption algorithms are usually better for bulk encryption. They have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key enc
- Has abstract
- enSymmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption (also known as asymmetric-key encryption). However, symmetric-key encryption algorithms are usually better for bulk encryption. They have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.
- Hypernym
- Algorithms
- Is primary topic of
- Symmetric-key algorithm
- Label
- enSymmetric-key algorithm
- Link from a Wikipage to an external page
- www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm%3Fcsnumber=44736
- Link from a Wikipage to another Wikipage
- Advanced Encryption Standard
- AEAD
- AES-GCM
- Algorithm
- Asymmetric-key cryptography
- Atbash
- Axel von Fersen the Younger
- Beaufort cipher
- Block cipher
- Blowfish (cipher)
- Byte
- Camellia (cipher)
- CAST5
- Category:Cryptographic algorithms
- ChaCha20
- Chosen-plaintext attack
- Ciphertext
- Cryptographically secure pseudorandom number generator
- Cryptographic primitive
- Cryptography
- Data Encryption Standard
- Differential cryptanalysis
- Diffie–Hellman key exchange
- Enigma machine
- Entropy (information theory)
- Feistel cipher
- Frequency table
- Hash function
- Horst Feistel
- Initialization vector
- International Data Encryption Algorithm
- Involution (mathematics)
- Key (cryptography)
- Known-plaintext attack
- Kuznyechik
- Lai–Massey scheme
- Linear cryptanalysis
- Message authentication code
- NIST
- Non-repudiation
- One-way compression function
- Plaintext
- Public-key cryptography
- Public key encryption
- Purple cipher
- RC4
- ROT13
- SAFER
- Salsa20
- Serpent (cipher)
- Shared secret
- Skipjack (cipher)
- Stream cipher
- Substitution cipher
- Triple DES
- Twofish
- Vatsyayana cipher
- XOR cipher
- SameAs
- 31k6Q
- 4317451-6
- Algoritmo de chave simétrica
- Algorytm symetryczny
- Criptografia simètrica
- Criptografía simétrica
- Crittografia simmetrica
- Crittografia simmetrica
- Cryptographie symétrique
- Kriptografia simetriko
- m.09cgsv
- m.0dxz7
- Penyulitan bersimetri
- Q327675
- Simetria ĉifro
- Simetrik anahtar algoritmaları
- Simetrinio rakto kriptografija
- Simetriskā atslēgšfirēšana
- Symetrická šifra
- Symetrická šifra
- Symmetric-key algorithm
- Symmetric-key algorithm
- Symmetrinen salaus
- Symmetrische cryptografie
- Symmetrisches Kryptosystem
- Symmetrisk kryptering
- Symmetrisk kryptering
- Szimmetrikus kulcsú rejtjelezés
- Thuật toán khóa đối xứng
- Κρυπτογράφηση Συμμετρικού Κλειδιού
- Симметричные криптосистемы
- Шифрування з симетричними ключами
- Սիմետրիկ բանալիով ալգորիթմներ
- צופן סימטרי
- الگوریتم کلید متقارن
- تعمية بالمفتاح المتناظر
- சமச்சீர் திறவுகோல் வழிமுறை
- സിമെട്രിക് കീ ക്രിപ്റ്റോഗ്രഫി
- სიმეტრიული კრიპტოსისტემა
- 共通鍵暗号
- 對稱密鑰加密
- 대칭 키 암호
- Subject
- Category:Cryptographic algorithms
- WasDerivedFrom
- Symmetric-key algorithm?oldid=1121110414&ns=0
- WikiPageLength
- 12694
- Wikipage page ID
- 53042
- Wikipage revision ID
- 1121110414
- WikiPageUsesTemplate
- Template:Authority control
- Template:Citation needed
- Template:Cryptography navbox
- Template:Efn
- Template:Main
- Template:More citations needed section
- Template:Noteslist
- Template:Reflist
- Template:Short description