Symmetric-key algorithms are algorithms for cryptography
that use the same cryptographic keys for both encryption of plaintext and
decryption of cipher text. The keys may be identical or there may be a simple
transformation to go between the two keys . The keys, in practice, represent a
shared secret between two or more parties that can be used to maintain a
private information link. This requirement that both parties have access to the
secret key is one of the main drawbacks of symmetric key encryption, in
comparison to public-key encryption (also known as asymmetric key encryption).
Types of symmetric-key algorithms
Symmetric-key encryption can use either stream ciphers or
block ciphers.
·
Stream ciphers encrypt the digits (typically
bytes) of a message one at a time.
·
Block ciphers take a number of bits and encrypt
them as a single unit, padding the plaintext so that it is a multiple of the
block size. Blocks of 64 bits were commonly used. The Advanced Encryption
Standard (AES) algorithm approved by NIST in December 2001, and the GCM block
cipher mode of operation use 128-bit blocks.
Implementations
Examples of popular symmetric algorithms include Twofish,
Serpent, AES (Rijndael), Blowfish, CAST5, Kuznyechik, RC4, 3DES, Skipjack,
Safer+/++ (Bluetooth), and IDEA.
Cryptographic primitives based on symmetric ciphers
Symmetric ciphers are commonly used to achieve other
cryptographic primitives than just encryption.
Encrypting a message does not guarantee that this message is
not changed while encrypted. Hence often a message authentication code is added
to a cipher text to ensure that changes to the cipher text will be noted by the
receiver. Message authentication codes can be constructed from symmetric
ciphers (e.g. CBC-MAC).
However, symmetric ciphers cannot be used for
non-repudiation purposes except by involving additional parties. See the
ISO/IEC 13888-2 standard.
Another application is to build hash functions from block
ciphers. See one-way compression function for descriptions of several such
methods.
Construction of symmetric ciphers
Main article: Feistel cipher
Many modern block ciphers are based on a construction
proposed by Horst Feistel. Feistel's construction makes it possible to build
invertible functions from other functions that are themselves not invertible.
Key generation
When used with asymmetric ciphers for key transfer,
pseudorandom key generators are nearly always used to generate the symmetric
cipher session keys. However, lack of randomness in those generators or in
their initialization vectors is disastrous and has led to cryptanalytic breaks
in the past. Therefore, it is essential that an implementation uses a source of
high entropy for its initialization.
Reciprocal cipher
A reciprocal cipher is a cipher where, just as one enters
the plaintext into the cryptography system to get the cipher text, one could
enter the cipher text into the same place in the system to get the plaintext. A
reciprocal cipher is also sometimes referred as self-reciprocal cipher.
Examples of reciprocal ciphers include:
·
Beaufort cipher
·
Enigma machine
·
ROT13
·
XOR cipher
·
Vatsyayana cipher
0 comments:
Post a Comment