Content deleted Content added
No edit summary Tags: Reverted Mobile edit Mobile web edit |
m →Implementations: HTTP to HTTPS for Cornell University |
||
(6 intermediate revisions by 5 users not shown) | |||
Line 1:
{{Short description|Algorithm}}
[[File:Simple symmetric encryption-en.svg|thumb|
'''Symmetric-key algorithms'''{{efn|Other terms for symmetric-key encryption are ''secret-key'', ''single-key'', ''shared-key'', ''one-key'', and ''private-key'' encryption. Use of the last and first terms can create ambiguity with similar terminology used in [[public-key cryptography]]. Symmetric-key cryptography is to be contrasted with [[asymmetric-key cryptography]].}} are [[algorithm]]s for [[cryptography]] that use the same [[Key (cryptography)|cryptographic keys]] for both the encryption of [[plaintext]] and the decryption of [[ciphertext]]. The keys may be identical, or there may be a simple transformation to go between the two keys.<ref>{{Cite journal|last=Kartit|first=Zaid|date=February 2016|title=Applying Encryption Algorithms for Data Security in Cloud Storage, Kartit, et al. |url=https://books.google.com/books?id=uEGFCwAAQBAJ&q=%22keys+may+be+identical%22&pg=PA147|journal=Advances in Ubiquitous Networking: Proceedings of UNet15|pages=147|isbn=9789812879905}}</ref> The keys, in practice, represent a [[shared secret]] between two or more parties that can be used to maintain a private information link.<ref>{{cite book |author=Delfs, Hans |author2=Knebl, Helmut |chapter = Symmetric-key encryption |title = Introduction to cryptography: principles and applications |publisher = Springer |year =
== Types ==
Line 11:
== Implementations ==
Examples of popular symmetric-key algorithms include [[Twofish]], [[Serpent (cipher)|Serpent]], [[Advanced Encryption Standard|AES]] (Rijndael), [[Camellia (cipher)|Camellia]], [[Salsa20]], [[ChaCha20]], [[Blowfish (cipher)|Blowfish]], [[CAST5]], [[Kuznyechik]], [[RC4]], [[Data Encryption Standard|DES]], [[Triple DES|3DES]], [[Skipjack (cipher)|Skipjack]], [[Secure and Fast Encryption Routine|Safer]], and [[International Data Encryption Algorithm|IDEA]].<ref>{{Cite web|url=
== Use as a cryptographic primitive ==
|