小孩黑眼圈很重是什么原因| 儿童淋巴结肿大挂什么科| 醉代表什么生肖| 丑人多作怪什么意思| 梦到喝酒是什么意思| 截根疗法是什么| 澳门使用什么货币| 胰头占位是什么病| 末梢血是什么意思| 绝世是什么意思| 焦糖色是什么颜色| 喝水牙疼是什么原因| 为什么有的人晒不黑| 肠胃炎能吃什么食物| 石钟乳是什么| 肚脐眼发炎是什么原因| who是什么意思| 股票换手率是什么意思| 吃什么东西能减肥| 山楂和什么泡水喝最好| 5月1日什么星座| 左后背发麻是什么原因| 阴道口出血是什么原因| 挥霍是什么意思| 用红笔写名字代表什么| 什么是普惠性幼儿园| 做梦梦见兔子是什么意思| 高密度脂蛋白胆固醇高是什么意思| 10月28号是什么星座| 心气虚吃什么药| 立冬吃什么| 肝穿刺检查是什么意思| 梦见老人去世预示什么| 腹肌不对称是什么原因| 甲状腺病变是什么意思| 为什么大便会拉出血| 一什么蜻蜓| 环切手术是什么| 友字五行属什么| 外阴炎吃什么药| 猫代表什么象征意义| fan是什么意思| 为什么女生| 石斤读什么| 舒字属于五行属什么| 梦见偷别人东西是什么意思| 着床出血是什么颜色| 动脉斑块是什么意思| 绿色食品是什么意思| 为什么叫八路军| 维生素b6主治什么病| 门前的小树已成年是什么歌| 6月28什么星座| 竹肠是什么部位| 急性荨麻疹不能吃什么食物| 浅表性胃炎吃什么药效果好| 阑尾炎疼吃什么药| 缺维生素d有什么症状| 梦见自己疯了什么意思| progress什么意思| 治疗幽门螺旋杆菌的四联药是什么| 天蝎和什么星座最配对| 羊水少吃什么| sec是什么单位| 五行中金代表什么| 幻肢是什么| 乙肝表面抗原是什么意思| 备孕期间要注意什么| 宫外孕有什么危害| 卵泡破裂是什么意思| 什么是人肉搜索| 老婆生日送什么鲜花| 白内障有什么症状| 偶发室性早搏什么意思| 胃寒吃点什么药| 脾胃不和吃什么中成药| 芹菜和西芹有什么区别| spf是什么意思| 血糖是什么意思| 梦见自己买衣服是什么意思| 高字是什么结构| 平安喜乐什么意思| 没落是什么意思| 梦见白萝卜是什么意思| 孩子容易出汗是什么原因| 妈妈的妹妹叫什么| 1.6号是什么星座| 为什么乳头会变硬| 脚踝后面的筋疼因为什么| 曦字五行属什么| 奶酪是什么做的| 狮子座和什么座最不配| 卡拉是什么意思| 脂肪瘤吃什么药可以消除| 今天天气适合穿什么衣服| 头晕做什么检查| 冠心病是什么病| 经常尿路感染是什么原因| 肝脾肿大是什么症状| 贝壳吃什么食物| 年轻人手抖是什么原因| 榆木脑袋是什么意思| 为什么会有口臭| 什么相关四字成语| 脸肿是什么原因引起的| 睡觉多梦吃什么药| 头发里长痣代表什么| 恐龙是什么时候灭绝的| 金玉其外败絮其中是什么意思| 指南针是什么时候发明的| 女人缺少雌激素吃什么| 二氧化硅是什么氧化物| 什么牌子助听器好| 出汗太多吃什么药好| 拔罐有什么用| 胎儿胆囊偏大有什么影响| 去离子水是什么水| 突然便秘是什么原因引起的| 洋葱什么时候收获| 甲亢多吃什么食物比较好| 疴是什么意思| 心跳的快是什么原因| 小孩流鼻涕咳嗽吃什么药| 蟹爪兰用什么肥料最好| legacy什么意思| 物尽其用什么意思| 锋字五行属什么| 什么药可以通血管| 药流吃什么药| 种牙好还是镶牙好区别是什么| egc是什么意思| 孤单的我还是没有改变是什么歌| pg是什么| 虞是什么意思| 龋齿挂什么科| 小腿灼热感是什么原因| 2003年属什么| 肝癌是什么| 立秋日有什么禁忌| 前列腺钙化有什么症状| 罗京什么病| 流鼻血去药店买什么药| 付字五行属什么| 佐匹克隆是什么药| 香港脚是什么| 吃激素有什么副作用| 油菜花像什么| 为什么胸一碰就疼| 砗磲是什么| 天什么云什么| 吃什么能缓解孕吐| 流星是什么| 脑梗塞什么症状| 玉帝叫什么名字| 普工是什么| 肽对人体有什么好处| 医保定点医院是什么意思| 脑梗复查挂什么科| 小孩尿味道很重是什么原因| 直肠脱垂有什么症状| 梓树为什么叫梧桐树| 眼花是什么原因| 什么药降肌酐最快最好| 宫颈糜烂用什么药好| crp是什么| 嗓子发干是什么原因| 印第安纹是什么| 发烧吃什么好| 林俊杰为什么不结婚| 什么是免疫组化检查| 维生素b补什么| 阴对什么| 咽峡炎吃什么药| 燃烧卡路里是什么意思| 例假提前是什么原因| 不是月经期出血是什么原因| 尿渗透压低是什么原因| 血红素是什么| 念珠菌阳性是什么病| 气虚血虚吃什么中成药| 霉菌阴道炎用什么药| 苦瓜和什么不能一起吃| 自己做生意叫什么职业| 硫黄是什么| uv是什么意思| 胎盘后壁是什么意思| 荨麻疹什么症状| 总是想吐是什么原因| 精子为什么叫怂| 倒车雷达什么牌子好| 性取向是什么| 党什么时候成立| 皇帝菜是什么菜| 血糖高吃什么| 梦见头发白了是什么意思| 身上带什么可以辟邪| 什么药可以溶解血栓| 荷叶搭配什么一起喝减肥效果好| 双职工是什么意思| 担是什么意思| 喜欢趴着睡是什么原因| 女人的逼什么样| normal什么意思| total什么意思| 美人鱼2什么时候上映| 杵状指见于什么疾病| 宫颈出血是什么症状| 51年属什么生肖| 牙龈变黑是什么原因| 李白有什么之称| 为什么端午安康| 枕戈待旦什么意思| 李子什么时候成熟| 党群是什么意思| 数字3代表什么意思| 法院起诉离婚需要什么材料| 什么时间立秋| 空调除湿和制冷有什么区别| 七月三十是什么星座| 欢是什么动物| hrd是什么| 补肾吃什么药最好| 梦见大火烧山是什么意思| 一进大门看见什么最好| 肝低回声结节是什么意思| 打白条是什么意思| 孕晚期头晕是什么原因| 迷糊是什么原因| 豆角没熟中毒什么症状| aed什么意思| 宫颈潴留囊肿是什么意思| 1967年出生属什么| 半身不遂是什么原因引起的| 大排是什么肉| 什么硬币最值钱| 右眉毛跳是什么预兆| 腋下属于什么科| 男人吃鸽子有什么好处| fci是什么意思| merry是什么意思| 饱不洗头饿不洗澡是为什么| 乙亥五行属什么| 细胞结构包括什么| 2004年是什么生肖| 说梦话是什么原因引起的| 三金片治什么病| 梦见自己被绑架了是什么意思| 经血颜色淡是什么原因| 男性尿道疼痛小便刺痛吃什么药| 重本是什么意思| 甲状腺是什么部位| 梦见手链断了是什么意思| b1是什么意思| 软是什么意思| 6月28日什么星座| 逼长什么样| 七月二号是什么日子| 红酒兑什么好喝| 眼睛痒吃什么药| 意境是什么意思| punk什么意思| 双肺纹理粗重什么意思| 经常流鼻血什么原因| 流产有什么症状| 百度

杜青林:不断总结典型经验 完善扶贫攻坚长效机制

百度 据沈强介绍,被巨厚冰层覆盖的南极大陆拥有相当全球海平面上升60米的巨大冰体,它的变化不仅控制着全球海平面变化,同时对海洋和气候及人类居住环境造成巨大影响。

Symmetric-key algorithms[a] are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys.[1] The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.[2] The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption (also known as asymmetric-key encryption).[3][4] However, symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.[5][6][7]

Symmetric-key encryption: the same key is used for both encryption and decryption

Types

edit

Symmetric-key encryption can use either stream ciphers or block ciphers.[8]

Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one at a time. An example is ChaCha20. Substitution ciphers are well-known ciphers, but can be easily decrypted using a frequency table.[9]

Block ciphers take a number of bits and encrypt them in a single unit, padding the plaintext to achieve a multiple of the block size. The Advanced Encryption Standard (AES) algorithm, approved by NIST in December 2001, uses 128-bit blocks.

Implementations

edit

Examples of popular symmetric-key algorithms include Twofish, Serpent, AES (Rijndael), Camellia, Salsa20, ChaCha20, Blowfish, CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer, and IDEA.[10]

Use as a cryptographic primitive

edit

Symmetric ciphers are commonly used to achieve other cryptographic primitives than just encryption.[citation needed]

Encrypting a message does not guarantee that it will remain unchanged while encrypted. Hence, often a message authentication code is added to a ciphertext to ensure that changes to the ciphertext will be noted by the receiver. Message authentication codes can be constructed from an AEAD cipher (e.g. AES-GCM).

However, symmetric ciphers cannot be used for non-repudiation purposes except by involving additional parties.[11] See the ISO/IEC 13888-2 standard.

Another application is to build hash functions from block ciphers. See one-way compression function for descriptions of several such methods.

Construction of symmetric ciphers

edit

Many modern block ciphers are based on a construction proposed by Horst Feistel. Feistel's construction makes it possible to build invertible functions from other functions that are themselves not invertible.[citation needed]

Security of symmetric ciphers

edit

Symmetric ciphers have historically been susceptible to known-plaintext attacks, chosen-plaintext attacks, differential cryptanalysis and linear cryptanalysis. Careful construction of the functions for each round can greatly reduce the chances of a successful attack.[citation needed] It is also possible to increase the key length or the rounds in the encryption process to better protect against attack. This, however, tends to increase the processing power and decrease the speed at which the process runs due to the amount of operations the system needs to do.[12]

Most modern symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography.[13] Quantum computers would exponentially increase the speed at which these ciphers can be decoded; notably, Grover's algorithm would take the square-root of the time traditionally required for a brute-force attack, although these vulnerabilities can be compensated for by doubling key length.[14] For example, a 128 bit AES cipher would not be secure against such an attack as it would reduce the time required to test all possible iterations from over 10 quintillion years to about six months. By contrast, it would still take a quantum computer the same amount of time to decode a 256 bit AES cipher as it would a conventional computer to decode a 128 bit AES cipher.[15] For this reason, AES-256 is believed to be "quantum resistant".[16][17]

Key management

edit

Key establishment

edit

Symmetric-key algorithms require both the sender and the recipient of a message to have the same secret key. All early cryptographic systems required either the sender or the recipient to somehow receive a copy of that secret key over a physically secure channel.

Nearly all modern cryptographic systems still use symmetric-key algorithms internally to encrypt the bulk of the messages, but they eliminate the need for a physically secure channel by using Diffie–Hellman key exchange or some other public-key protocol to securely come to agreement on a fresh new secret key for each session/conversation (forward secrecy).

Key generation

edit

When used with asymmetric ciphers for key transfer, pseudorandom key generators are nearly always used to generate the symmetric cipher session keys. However, lack of randomness in those generators or in their initialization vectors is disastrous and has led to cryptanalytic breaks in the past. Therefore, it is essential that an implementation use a source of high entropy for its initialization.[18][19][20]

Reciprocal cipher

edit

A reciprocal cipher is a cipher where, just as one enters the plaintext into the cryptography system to get the ciphertext, one could enter the ciphertext into the same place in the system to get the plaintext. A reciprocal cipher is also sometimes referred as self-reciprocal cipher.[21][22]

Practically all mechanical cipher machines implement a reciprocal cipher, a mathematical involution on each typed-in letter. Instead of designing two kinds of machines, one for encrypting and one for decrypting, all the machines can be identical and can be set up (keyed) the same way.[23]

Examples of reciprocal ciphers include:

The majority of all modern ciphers can be classified as either a stream cipher, most of which use a reciprocal XOR cipher combiner, or a block cipher, most of which use a Feistel cipher or Lai–Massey scheme with a reciprocal transformation in each round.[citation needed]

Notes

edit
  1. ^ Other terms for symmetric-key encryption are secret-key, single-key, shared-key, one-key, and private-key encryption. Use of the last and first terms can create ambiguity with similar terminology used in public-key cryptography. Symmetric-key cryptography is to be contrasted with asymmetric-key cryptography.

References

edit
  1. ^ Kartit, Zaid (February 2016). "Applying Encryption Algorithms for Data Security in Cloud Storage, Kartit, et al". Advances in Ubiquitous Networking: Proceedings of UNet15: 147. ISBN 9789812879905.
  2. ^ Delfs, Hans; Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications. Springer. ISBN 9783540492436.
  3. ^ Mullen, Gary; Mummert, Carl (2007). Finite fields and applications. American Mathematical Society. p. 112. ISBN 9780821844182.
  4. ^ "Demystifying symmetric and asymmetric methods of encryption". Geeks for Geeks. 2025-08-07.
  5. ^ Johnson, Leighton (2016), "Security Component Fundamentals for Assessment", Security Controls Evaluation, Testing, and Assessment Handbook, Elsevier, pp. 531–627, doi:10.1016/b978-0-12-802324-2.00011-7, ISBN 9780128023242, S2CID 63087943, retrieved 2025-08-07
  6. ^ Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio (2025-08-07). "Algorithms for Lightweight Key Exchange". Sensors. 17 (7): 1517. doi:10.3390/s17071517. ISSN 1424-8220. PMC 5551094. PMID 28654006.
  7. ^ Bernstein, Daniel J.; Lange, Tanja (2025-08-07). "Post-quantum cryptography". Nature. 549 (7671): 188–194. Bibcode:2017Natur.549..188B. doi:10.1038/nature23461. ISSN 0028-0836. PMID 28905891. S2CID 4446249.
  8. ^ Pelzl & Paar (2010). Understanding Cryptography. Berlin: Springer-Verlag. p. 30. Bibcode:2010uncr.book.....P.
  9. ^ Bellare, Mihir; Rogaway, Phillip (2005). Introduction to Modern Cryptography (PDF).
  10. ^ Roeder, Tom. "Symmetric-Key Cryptography". www.cs.cornell.edu. Retrieved 2025-08-07.
  11. ^ "ISO/IEC 13888-2:2010". ISO. Retrieved 2025-08-07.
  12. ^ David R. Mirza Ahmad; Ryan Russell (2002). Hack proofing your network (2nd ed.). Rockland, MA: Syngress. pp. 165–203. ISBN 1-932266-18-6. OCLC 51564102.
  13. ^ Daniel J. Bernstein (2009). "Introduction to post-quantum cryptography" (PDF). Post-Quantum Cryptography.
  14. ^ Daniel J. Bernstein (2025-08-07). "Grover vs. McEliece" (PDF). {{cite journal}}: Cite journal requires |journal= (help)
  15. ^ Wood, Lamont (2025-08-07). "The Clock Is Ticking for Encryption". Computerworld. Retrieved 2025-08-07.
  16. ^ O'Shea, Dan (2025-08-07). "AES-256 joins the quantum resistance". Fierce Electronics. Retrieved 2025-08-07.
  17. ^ Weissbaum, Fran?ois; Lugrin, Thomas (2023), Mulder, Valentin; Mermoud, Alain; Lenders, Vincent; Tellenbach, Bernhard (eds.), "Symmetric Cryptography", Trends in Data Protection and Encryption Technologies, Cham: Springer Nature Switzerland, pp. 7–10, doi:10.1007/978-3-031-33386-6_2, ISBN 978-3-031-33386-6
  18. ^ Ian Goldberg and David Wagner. "Randomness and the Netscape Browser". January 1996 Dr. Dobb's Journal. quote: "it is vital that the secret keys be generated from an unpredictable random-number source."
  19. ^ Ristenpart, Thomas; Yilek, Scott (2010). "When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography" (PDF). NDSS Symposium 2010. Random number generators (RNGs) are consistently a weak link in the secure use of cryptography.
  20. ^ "Symmetric Cryptography". James. 2025-08-07.
  21. ^ Paul Reuvers and Marc Simons. Crypto Museum. "Enigma Uhr". 2009.
  22. ^ Chris Christensen. "Simple Substitution Ciphers". 2006.
  23. ^ Greg Goebel. "The Mechanization of Ciphers". 2018.
  24. ^ "... the true Beaufort cipher. Notice that we have reciprocal encipherment; encipherment and decipherment are identically the same thing." -- Helen F. Gaines. "Cryptanalysis: A Study of Ciphers and Their Solution". 2014. p. 121.
  25. ^ Greg Goebel. "The Mechanization of Ciphers". 2018.
  26. ^ Friedrich L. Bauer. "Decrypted Secrets: Methods and Maxims of Cryptology". 2006. p. 144
  27. ^ David Salomon. "Coding for Data and Computer Communications". 2006. p. 245
  28. ^ Greg Goebel. "US Codebreakers In The Shadow Of War". 2018.
扁桃体结石是什么原因引起的 什么是腔梗 冰箱底部漏水是什么原因 1985年属牛的是什么命 蛋皮痒痒是什么病
眩晕症有什么症状 腿上长水泡是什么原因引起的 音色是什么意思 脖子长痘是什么原因引起的 独行侠是什么意思
便秘吃什么菜有助排便 呓语是什么意思 8月26日什么星座 胃疼吃点什么药 宫腔积液排出什么颜色
吃丝瓜有什么功效和作用 身骑白马是什么方言 温州有什么好玩的 鸟加一笔变成什么字 呵呵什么意思
梦见水是什么征兆dajiketang.com 鸟飞进家里是什么预兆hcv8jop3ns5r.cn 骨古头坏死吃什么药xianpinbao.com 有什么国家dayuxmw.com 87年属什么hcv7jop7ns1r.cn
胃痉挛吃什么药最有效helloaicloud.com 吃芒果有什么坏处hcv8jop8ns4r.cn 姐夫的爸爸叫什么hcv9jop4ns3r.cn 打破伤风不能吃什么aiwuzhiyu.com 颜控什么意思bjhyzcsm.com
愿闻其详是什么意思hcv8jop1ns4r.cn 儿童哮喘挂什么科hcv8jop5ns0r.cn 胃不好应该吃什么hcv9jop5ns1r.cn 化疗是什么wmyky.com 参加白事回来注意什么weuuu.com
pagani是什么车hcv8jop3ns9r.cn 老炮儿是什么意思啊hcv9jop0ns6r.cn 什么是卧蚕xinjiangjialails.com 女人吃什么增加雌激素hcv7jop9ns6r.cn 蜱虫长什么样子图片hcv9jop3ns2r.cn
百度