In our construction, we can prevent privacy leakage in the integrity auditing process as the scheme is based on
symmetric key cryptography.
Symmetric key cryptography is superior to public key cryptography in terms of speed and low energy cost.
Therefore,
symmetric key cryptography, in which secret keys are used at both sides of communication, is still essential.
(2003), Cellular Programming and
Symmetric Key Cryptography Systems, In: Genetic and Evolutionary Computation Conference GECCO 03, Erick Cantu-Paz et al (Eds.), pp.
Symmetric key cryptography is used to encrypt each packet instead of public key cryptography because it is considerably less computationally intensive.
In
symmetric key cryptography, the same key is used as a parameter of a cryptographic function such as DES (Data Encryption Standard) [6] to encrypt or decrypt data.
Symmetric key * Secret Key or
Symmetric Key Cryptography - Both parties have access to the same secret key and use it and the same algorithm to encrypt and decrypt a message.
An improved
Symmetric key cryptography with DNA Based strong cipher.
In
Symmetric Key Cryptography [17][20], only one key is used for encryption purpose and the same key is used for decryption purpose as well.