情是什么意思| 山楂不能和什么一起吃| 畈是什么意思| 勃起是什么| 艾滋病有什么症状| 女人吃鹅蛋有什么好处| 乳腺增生不能吃什么食物| 手淫过度吃什么药| 左手发麻什么原因| 抗组胺药是什么意思| 什么是回迁房| 晚上睡觉腿抽筋是什么原因| 什么样的花| 治前列腺炎吃什么药效果最好| 二甲医院是什么级别| 红楼梦是什么朝代| 不疑有他什么意思| epa是什么| 什么东西快速补血| 眼皮发黑是什么病症| 老克勒是什么意思| 1984年属鼠是什么命| 总胆汁酸是什么意思| 尿葡萄糖高是什么原因| 颈动脉在什么位置| 天地不仁以万物为刍狗是什么意思| oppo是什么牌子| 一贫如什么| 黄铜是什么| 狗取什么名字好| roca是什么品牌| 梦见捡钱了是什么预兆| 如梦初醒是什么意思| 养胃早餐吃什么好| 海带不能和什么一起吃| 脚趾甲变黑是什么原因| 庚申五行属什么| 50肩是什么意思| 代表什么| 提高免疫力吃什么药| 女人吃槐花有什么好处| 孔雀鱼吃什么食物| 脚底脱皮是什么原因| 春天的花开秋天的风是什么歌| 想长胖喝什么奶粉好| 舌根放血有什么好处| 珍珠母是什么东西| 丙氨酸氨基转移酶是什么意思| 舒张压偏低是什么原因| 什么原因导致性功能减退| 脸上长湿疹是什么原因| 蜂蜜有什么功效| 下贱是什么意思| 芒果吃了有什么好处和坏处| 耳鸣有什么症状| cv是什么意思| 黄芪有什么功效| 吃什么能阻止性早熟| 2004年是什么命| 梦到别人给钱是什么意思| 静脉曲张不治疗会有什么后果| 什么是包皮| 脚面肿是什么原因| 身份证尾号代表什么| 二垒是什么意思| 白细胞一个加号什么意思| degaia是什么牌子| 男人时间短吃什么药| 养胃早餐吃什么好| eb病毒igg抗体阳性是什么意思| 反酸是什么感觉| 左手中指麻木是什么原因| 抗氧化性是什么意思| 33岁属什么| 心肌劳损的症状是什么| 乙状结肠炎吃什么药| 吃什么消炎| 什么发什么颜| 夜间抽搐的原因是什么| 合集是什么意思| 在眼皮老跳是什么征兆| 什么情况下需要做活检| 瓜田李下什么意思| 彼岸花开是什么意思| 淡定自若什么意思| 小月子吃什么好| 分身是什么意思| 大腿内侧发黑是什么原因| dv是什么牌子| 孕囊形态欠规则是什么意思| 回族不能吃什么肉| 挑拨离间是什么意思| 斗鱼吃什么食物| 哪吒妈妈叫什么| 哺乳期什么时候来月经正常| 做绝育手术对女人有什么影响| 拆线挂什么科| 吃什么掉秤快| 沦丧是什么意思| 2倍是什么意思| 冬瓜什么时候种植最好| 媳妇是什么意思| 身主天相是什么意思| 断奶吃什么药| 僵尸为什么怕糯米| 静修是什么意思| 什么人容易得白肺病| 火龙果有什么好处| 什么叫甲亢| 阴历六月是什么月| 雌二醇凝胶有什么作用| 这叫什么| 宫保鸡丁宫保是指什么| 有个马的标志是什么车| 霉菌用什么药| 好无奈是什么意思| 竖中指是什么意思| 大肠湿热吃什么中成药| 尾巴长长的是什么鸟| 什么病不能坐飞机| 梦见自己生病了是什么意思| 美瞳是什么| 芥花油是什么油| 优点是什么意思| 姚明什么时候退役的| 82年的拉菲是什么意思| 十二年义务教育什么时候开始| 总打哈欠是什么原因| 突然低血压是什么原因造成的| 什么东西不能一起吃| 虾膏是什么| 芥末是什么植物做的| 心脏跳动过快吃什么药| 梦见盖新房子是什么意思| 万中无一什么意思| 搞基是什么意思| 女人打呼噜是什么原因| 菜板什么木材最好| 向日葵是什么季节| 高考450分能上什么学校| 万人空巷是什么意思| 打火机里的液体是什么| 智齿是什么样的| 张起灵和吴邪什么关系| 眼角长脂肪粒是什么原因| 金玉其外败絮其中是什么意思| 幽门螺杆菌抗体阳性什么意思| 木耳和什么不能一起吃| 男人经常熬夜炖什么汤| 身体动不动就出汗是什么原因| 齐人之福什么意思| 人爱出汗是什么原因| ye是什么意思| 码是什么单位| kt什么意思| 三月什么星座| 国家为什么要扫黄| 天蝎座与什么星座最配| d是什么| 为什么吹空调会咳嗽| 呃是什么意思| 路虎为什么叫奇瑞路虎| 低血压低是什么原因| 3岁宝宝流鼻血是什么原因| 耳石症是什么原因| 石决明是什么| 为什么这么热| 认命是什么意思| 情感细腻是什么意思| 为什么现在不吃糖丸了| 天珠是什么材质| 7月15是什么星座的| 吃什么补气虚最快最好| 病毒性肺炎吃什么药| 吃什么东西增加免疫力| 俄罗斯乌克兰为什么打仗| 小排畸什么时候做| 全血细胞减少是什么意思| 行是什么意思| 脸容易红是什么原因| 澄面是什么面粉| 晚上吃什么有助于减肥| 财不外露什么意思| 昆仑山在什么地方| 心咒是什么意思| 恭喜什么意思| edifier是什么牌子| 白藜芦醇是什么东西| 黑瞎子是什么动物| 吃什么可以增加黄体酮| 身份证上的数字是什么字体| 有时候会感到莫名的难过是什么歌| 肠胃不舒服挂什么科| 讨厌是什么意思| 什么补血补气最好最快| 正财透干是什么意思| 什么是逆向思维| b型和o型生的孩子是什么血型| 轻度肠上皮化生是什么意思| 什么是鼻窦炎| 黄金果是什么水果| 柏拉图式恋爱是什么意思| 脚面浮肿是什么原因| 克隆恩病是什么| 明哲保身是什么生肖| 12月9日什么星座| 虹膜是什么意思| 菩萨是什么意思| 嘴唇下面长痘痘是什么原因| 什么叫游走性关节疼痛| 血栓吃什么药| 脑梗什么意思| 草字头有什么字| 槟榔什么味道| 肌酐偏低是什么意思| 航空器是什么| 补充蛋白质吃什么最好| 泥鳅吃什么| 唐三藏的真名叫什么| 狗吃什么药会立马就死| 命理是什么意思| 没事找事是什么意思| 吃阿莫西林过敏有什么症状| 原发性高血压是什么意思| ab型血和o型血生的孩子是什么血型| 嘴唇干燥是什么原因| 做梦捡到钱是什么意思| 善存片什么时候吃最好| 蒋介石为什么不杀张学良| 尿液突然变深褐色是什么原因| 好文采是什么意思| 阑尾炎输液输什么药| 京酱肉丝用什么酱| 生源地是指什么| 处女座属于什么星象| 姿态万千的意思是什么| 9月13日是什么纪念日| 小孩自闭症是什么原因引起的| 做不好的梦预示着什么| 草龟吃什么食物| 测血糖挂号挂什么科| 4月15日是什么星座| 半月板变性是什么意思| 丝瓜有什么营养| 太阳一晒脸就红是什么原因| 4月5日是什么星座| 什么的花瓣| 唐老鸭叫什么名字| 盆腔炎用什么药效果好| 氧饱和度是什么意思| 打胎用什么药| 协调什么意思| 什么牌子的大米好吃| 月经突然停止是什么原因| 白发吃什么维生素| 黄褐斑是什么引起的| 手被辣椒辣了用什么方法解辣| 蝈蝈吃什么食物| 势在必得是什么意思| 吃月饼是什么生肖| 唵嘛呢叭咪吽什么意思| 为什么天气热皮肤就痒| 大圆脸适合什么发型| 心脏不舒服吃什么药最好| 百度

(出售)榆次世界知音楼中楼4室2厅2卫 送车位及地库

(Redirected from Symmetric key)
百度 1985年著名科学家钱学森在《城市规划》第四期发表《关于建立城市学的设想》一文。

Symmetric-key algorithms[a] are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys.[1] The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.[2] The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption (also known as asymmetric-key encryption).[3][4] However, symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.[5][6][7]

Symmetric-key encryption: the same key is used for both encryption and decryption

Types

edit

Symmetric-key encryption can use either stream ciphers or block ciphers.[8]

Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one at a time. An example is ChaCha20. Substitution ciphers are well-known ciphers, but can be easily decrypted using a frequency table.[9]

Block ciphers take a number of bits and encrypt them in a single unit, padding the plaintext to achieve a multiple of the block size. The Advanced Encryption Standard (AES) algorithm, approved by NIST in December 2001, uses 128-bit blocks.

Implementations

edit

Examples of popular symmetric-key algorithms include Twofish, Serpent, AES (Rijndael), Camellia, Salsa20, ChaCha20, Blowfish, CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer, and IDEA.[10]

Use as a cryptographic primitive

edit

Symmetric ciphers are commonly used to achieve other cryptographic primitives than just encryption.[citation needed]

Encrypting a message does not guarantee that it will remain unchanged while encrypted. Hence, often a message authentication code is added to a ciphertext to ensure that changes to the ciphertext will be noted by the receiver. Message authentication codes can be constructed from an AEAD cipher (e.g. AES-GCM).

However, symmetric ciphers cannot be used for non-repudiation purposes except by involving additional parties.[11] See the ISO/IEC 13888-2 standard.

Another application is to build hash functions from block ciphers. See one-way compression function for descriptions of several such methods.

Construction of symmetric ciphers

edit

Many modern block ciphers are based on a construction proposed by Horst Feistel. Feistel's construction makes it possible to build invertible functions from other functions that are themselves not invertible.[citation needed]

Security of symmetric ciphers

edit

Symmetric ciphers have historically been susceptible to known-plaintext attacks, chosen-plaintext attacks, differential cryptanalysis and linear cryptanalysis. Careful construction of the functions for each round can greatly reduce the chances of a successful attack.[citation needed] It is also possible to increase the key length or the rounds in the encryption process to better protect against attack. This, however, tends to increase the processing power and decrease the speed at which the process runs due to the amount of operations the system needs to do.[12]

Most modern symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography.[13] Quantum computers would exponentially increase the speed at which these ciphers can be decoded; notably, Grover's algorithm would take the square-root of the time traditionally required for a brute-force attack, although these vulnerabilities can be compensated for by doubling key length.[14] For example, a 128 bit AES cipher would not be secure against such an attack as it would reduce the time required to test all possible iterations from over 10 quintillion years to about six months. By contrast, it would still take a quantum computer the same amount of time to decode a 256 bit AES cipher as it would a conventional computer to decode a 128 bit AES cipher.[15] For this reason, AES-256 is believed to be "quantum resistant".[16][17]

Key management

edit

Key establishment

edit

Symmetric-key algorithms require both the sender and the recipient of a message to have the same secret key. All early cryptographic systems required either the sender or the recipient to somehow receive a copy of that secret key over a physically secure channel.

Nearly all modern cryptographic systems still use symmetric-key algorithms internally to encrypt the bulk of the messages, but they eliminate the need for a physically secure channel by using Diffie–Hellman key exchange or some other public-key protocol to securely come to agreement on a fresh new secret key for each session/conversation (forward secrecy).

Key generation

edit

When used with asymmetric ciphers for key transfer, pseudorandom key generators are nearly always used to generate the symmetric cipher session keys. However, lack of randomness in those generators or in their initialization vectors is disastrous and has led to cryptanalytic breaks in the past. Therefore, it is essential that an implementation use a source of high entropy for its initialization.[18][19][20]

Reciprocal cipher

edit

A reciprocal cipher is a cipher where, just as one enters the plaintext into the cryptography system to get the ciphertext, one could enter the ciphertext into the same place in the system to get the plaintext. A reciprocal cipher is also sometimes referred as self-reciprocal cipher.[21][22]

Practically all mechanical cipher machines implement a reciprocal cipher, a mathematical involution on each typed-in letter. Instead of designing two kinds of machines, one for encrypting and one for decrypting, all the machines can be identical and can be set up (keyed) the same way.[23]

Examples of reciprocal ciphers include:

The majority of all modern ciphers can be classified as either a stream cipher, most of which use a reciprocal XOR cipher combiner, or a block cipher, most of which use a Feistel cipher or Lai–Massey scheme with a reciprocal transformation in each round.[citation needed]

Notes

edit
  1. ^ Other terms for symmetric-key encryption are secret-key, single-key, shared-key, one-key, and private-key encryption. Use of the last and first terms can create ambiguity with similar terminology used in public-key cryptography. Symmetric-key cryptography is to be contrasted with asymmetric-key cryptography.

References

edit
  1. ^ Kartit, Zaid (February 2016). "Applying Encryption Algorithms for Data Security in Cloud Storage, Kartit, et al". Advances in Ubiquitous Networking: Proceedings of UNet15: 147. ISBN 9789812879905.
  2. ^ Delfs, Hans; Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications. Springer. ISBN 9783540492436.
  3. ^ Mullen, Gary; Mummert, Carl (2007). Finite fields and applications. American Mathematical Society. p. 112. ISBN 9780821844182.
  4. ^ "Demystifying symmetric and asymmetric methods of encryption". Geeks for Geeks. 2025-08-06.
  5. ^ Johnson, Leighton (2016), "Security Component Fundamentals for Assessment", Security Controls Evaluation, Testing, and Assessment Handbook, Elsevier, pp. 531–627, doi:10.1016/b978-0-12-802324-2.00011-7, ISBN 9780128023242, S2CID 63087943, retrieved 2025-08-06
  6. ^ Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio (2025-08-06). "Algorithms for Lightweight Key Exchange". Sensors. 17 (7): 1517. doi:10.3390/s17071517. ISSN 1424-8220. PMC 5551094. PMID 28654006.
  7. ^ Bernstein, Daniel J.; Lange, Tanja (2025-08-06). "Post-quantum cryptography". Nature. 549 (7671): 188–194. Bibcode:2017Natur.549..188B. doi:10.1038/nature23461. ISSN 0028-0836. PMID 28905891. S2CID 4446249.
  8. ^ Pelzl & Paar (2010). Understanding Cryptography. Berlin: Springer-Verlag. p. 30. Bibcode:2010uncr.book.....P.
  9. ^ Bellare, Mihir; Rogaway, Phillip (2005). Introduction to Modern Cryptography (PDF).
  10. ^ Roeder, Tom. "Symmetric-Key Cryptography". www.cs.cornell.edu. Retrieved 2025-08-06.
  11. ^ "ISO/IEC 13888-2:2010". ISO. Retrieved 2025-08-06.
  12. ^ David R. Mirza Ahmad; Ryan Russell (2002). Hack proofing your network (2nd ed.). Rockland, MA: Syngress. pp. 165–203. ISBN 1-932266-18-6. OCLC 51564102.
  13. ^ Daniel J. Bernstein (2009). "Introduction to post-quantum cryptography" (PDF). Post-Quantum Cryptography.
  14. ^ Daniel J. Bernstein (2025-08-06). "Grover vs. McEliece" (PDF). {{cite journal}}: Cite journal requires |journal= (help)
  15. ^ Wood, Lamont (2025-08-06). "The Clock Is Ticking for Encryption". Computerworld. Retrieved 2025-08-06.
  16. ^ O'Shea, Dan (2025-08-06). "AES-256 joins the quantum resistance". Fierce Electronics. Retrieved 2025-08-06.
  17. ^ Weissbaum, Fran?ois; Lugrin, Thomas (2023), Mulder, Valentin; Mermoud, Alain; Lenders, Vincent; Tellenbach, Bernhard (eds.), "Symmetric Cryptography", Trends in Data Protection and Encryption Technologies, Cham: Springer Nature Switzerland, pp. 7–10, doi:10.1007/978-3-031-33386-6_2, ISBN 978-3-031-33386-6
  18. ^ Ian Goldberg and David Wagner. "Randomness and the Netscape Browser". January 1996 Dr. Dobb's Journal. quote: "it is vital that the secret keys be generated from an unpredictable random-number source."
  19. ^ Ristenpart, Thomas; Yilek, Scott (2010). "When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography" (PDF). NDSS Symposium 2010. Random number generators (RNGs) are consistently a weak link in the secure use of cryptography.
  20. ^ "Symmetric Cryptography". James. 2025-08-06.
  21. ^ Paul Reuvers and Marc Simons. Crypto Museum. "Enigma Uhr". 2009.
  22. ^ Chris Christensen. "Simple Substitution Ciphers". 2006.
  23. ^ Greg Goebel. "The Mechanization of Ciphers". 2018.
  24. ^ "... the true Beaufort cipher. Notice that we have reciprocal encipherment; encipherment and decipherment are identically the same thing." -- Helen F. Gaines. "Cryptanalysis: A Study of Ciphers and Their Solution". 2014. p. 121.
  25. ^ Greg Goebel. "The Mechanization of Ciphers". 2018.
  26. ^ Friedrich L. Bauer. "Decrypted Secrets: Methods and Maxims of Cryptology". 2006. p. 144
  27. ^ David Salomon. "Coding for Data and Computer Communications". 2006. p. 245
  28. ^ Greg Goebel. "US Codebreakers In The Shadow Of War". 2018.
中国一词最早出现在什么时候 晚上一直做梦是什么原因引起的 不孕不育挂什么科 俄罗斯为什么要打乌克兰 赵本山什么时候去世的
蝴蝶效应比喻什么 破财消灾什么意思 睡醒口干口苦是什么原因 黄芪和什么泡水壮阳 大人吃什么排黄疸快
梦见梅花鹿是什么预兆 济公叫什么名字 小白兔是什么意思 小燕子吃什么食物 低血压吃什么可以补
背债是什么意思 hcg高是什么原因 鱼生是什么鱼 倭瓜是什么瓜 看膝盖挂什么科
莫名其妙的名是什么意思hcv8jop2ns6r.cn 心机重的人弱点是什么hcv8jop6ns8r.cn 慌张的反义词是什么hcv8jop4ns7r.cn 为什么会有眼袋hcv7jop9ns3r.cn 皮脂腺囊肿看什么科hcv8jop8ns5r.cn
pvd是什么意思hcv8jop6ns8r.cn 木薯粉是什么做的hcv9jop1ns0r.cn 洁面液是干什么用的hcv9jop4ns3r.cn 螃蟹是什么季节吃的hcv8jop4ns2r.cn 酸菜鱼一般加什么配菜hcv9jop1ns0r.cn
脚趾头抽筋是什么原因hcv7jop6ns4r.cn 胸有成竹是什么意思shenchushe.com 60年属鼠是什么命0735v.com 海龟吃什么hcv9jop1ns9r.cn 胰腺上长瘤意味着什么hcv8jop2ns6r.cn
颈椎不好挂什么科hcv7jop9ns6r.cn 中秋节适合吃什么菜hcv7jop4ns6r.cn 糖粉和白糖有什么区别hcv8jop0ns0r.cn 希思黎属于什么档次xscnpatent.com 今期难过美人关是什么生肖1949doufunao.com
百度