×
☰ Menu

 


Symmetric Key Cryptography

A symmetric encryption scheme has five ingredients:
1. Plaintext: This is the original intelligible message or data that is fed into the algorithm as input.
2. Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext.
3. Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key being used at the time. The exact substitutions and transformations performed by the algorithm depend on the key.
4. Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the secret key. For a given message, two different keys will produce two different cipher texts. The cipher text is an apparently random stream of data and, as it stands, is unintelligible.
5. Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the cipher text and the secret key and produces the original plaintext.

 


Related Articles 
1: Cryptography
2: Symmetric Key Cryptography
3: Asymmetric Cryptography (Public Key Cryptography)
4: Difference Between Symmetric Key Cryptography and Asymmetric Key Cryptography