AAP logoAAP logo
Article
WATER, ENERGY, AND THE ENVIRONMENT, EDUCATION
symmetric-key encryption

With symmetric-key encryption, the encryption key can be calculated from the decryption key and vice versa. With most symmetric algorithms, the same key is used for both encryption and decryption.
Implementations of symmetric-key encryption can be highly efficient so that users do not experience any significant time delay as a result of the encryption and decryption. Symmetric-key encryption also provides a degree of authentication, since information encrypted with one symmetric key cannot be decrypted with any other symmetric key. Thus, as long as the symmetric key is kept secret by the two parties using it to encrypt communications, each party can be sure that it is communicating with the other as long as the decrypted messages continue to make sense.

Posted by:
AAP Bridge

COMMENT
loading