secret key cryptography

(redirected from Symmetric encryption)
Also found in: Dictionary.

secret key cryptography

An encryption method that uses the same secret key to encrypt and decrypt messages. The problem with this method is transmitting the secret key to a legitimate person who needs it. Contrast with "public key cryptography," which uses a two-part key; one public and one private. See cryptography for details on both methods.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Though asymmetric encryption is more secure than symmetric encryption, symmetric can encode data at least 10 times faster.
The proposed scheme is believed to provide better efficiency in terms of key generation process as this scheme uses symmetric encryption rather than asymmetric one.
* The proposed model reduces overall encryption and decryption time by merging symmetric encryption and CP-ABE encryption.
Upon receiving the request from DMV, the TA creates a set of pseudonymous certificates {[PCert.sub.TA,5G_ID,j]}, a set of private keys {[SK.sub.5G_ID,j]}, a policy, Policy = {"police vehicle" OR "ambulance" OR "traffic law enforcement" OR "traffic authority"}, and a tag U [member of] [Z*.sub.q], and delivers them to the DMV by sending SEnc([S.sub.r], ({[SK.sub.5G_ID,j]]}, {[PCert.sub.TA,5G_ID,j]} [PK.sub.ABE], Policy, U)), where SEnc(x) is an symmetric encryption function and [PK.sub.ABE] is the public key used to encrypt a onetime random encryption key [S.sub.key] under Policy using CP-ABE [11].
A symmetric blind decryption scheme BlindDecyption consists of a symmetric encryption scheme SE = (Gen, Enc, Dec) and a two-party protocol BlindDec.
Hadhoud, "Performance evaluation of symmetric encryption algorithms," Communications of the IBIMA, vol.
In this paper, we use symmetric encryption to protect his/her personal privacy from unauthorized access.
According to Lucideus, the brains behind UPI's security, as far as data security is concerned, UPI uses a combination of asymmetric (PKI) and symmetric encryption algorithm (256-bit AES), in addition to SSL.
Keywords: Cloud computing, honey encryption, data management, data privacy, data security and symmetric encryption.
It is ensured that the data stored in the untrusted cloud server is confidential and consistent by using a data encryption algorithm called 2-Keys Symmetric Encryption. Unlike other encryption algorithms, this encryption algorithm needs lesser computation overhead.
Playfair cipher is a symmetric encryption technique.
ZigBee devices can transmit data over long distances and are typically used in low data rate applications that require long battery life and secure networking (ZigBee networks are secured by 128 bit symmetric encryption keys.) ZigBee has a defined rate of 250 kbit/s, best suited for intermittent data transmissions from a sensor or input device.

Full browser ?