secret key cryptography

(redirected from Symmetric encryption)
Also found in: Dictionary.

secret key cryptography

An encryption method that uses the same secret key to encrypt and decrypt messages. The problem with this method is transmitting the secret key to a legitimate person who needs it. Contrast with "public key cryptography," which uses a two-part key; one public and one private. See cryptography for details on both methods.
References in periodicals archive ?
A symmetric encryption (SE) scheme with key space K consists of two probabilistic polynomial time (PPT) algorithms: SE.
The proposed model reduces overall encryption and decryption time by merging symmetric encryption and CP-ABE encryption.
This paper focuses on using the symmetric encryption scheme in implementation of the forward secure secret key encryption scheme.
Highly-scalable searchable symmetric encryption with support for Boolean queries," in proc.
Symmetric encryption was used to produce a cipher text C from a seed S.
Keywords: confidentiality, remote integrity verification, dynamic data operations, public verifiability, symmetric encryption, data storage security, privacy preserving auditing
AC] mod n] that we use as a shared symmetric encryption key.
Through CipherCloud, CCB will be able to leverage the strength of AES 256-bit symmetric encryption to protect customer information against data theft, third party surveillance and other cloud risks.
Most security mechanisms are based on Symmetric Encryption or Asymmetric Encryption.
FILEGARD uses a strong and symmetric encryption algorithm (AES128).
Divided into three broad sections covering cryptography, network security applications and system security, individual chapters cover such topics as public-key cryptography algorithms, symmetric encryption, Kerberos, SSL, IP security, intrusion detection methods and firewalls.
This volume presents 22 papers drawn from those sessions, addressing such topics as minimal message complexity of asynchronous multi-party contract signing, tight enforcement of information-release policies for dynamic languages, securing timeout instructions in web applications, cryptographic protocol synthesis and verification for multiparty sessions, specification and analysis of dynamic authorization policies, policy compliance in collaborative systems, expressive power of definitive clauses for verifying authenticity, and universally composable symmetric encryption.

Full browser ?