Cryptography/Symmetric Ciphers

From Wikibooks, open books for an open world
Jump to: navigation, search

A symmetric key cipher (also called a secret-key cipher, or a one-key cipher, or a private-key cipher, or a shared-key cipher) Shared_secretis one that uses the same (necessarily secret) key to encrypt messages as it does to decrypt messages.

Until the invention of asymmetric key cryptography (commonly termed "public key / private key" crypto) in the 1970s, all ciphers were symmetric. Each party to the communication needed a key to encrypt a messages; and a recipient needed a copy of the same key to decrypt the message. This presented a significant problem, as it required all parties to have a secure communication system (e.g. face-to-face meeting or secure courier) in order to distribute the required keys. The number of secure transfers required rises impossibly, and wholly impractically, quickly with the number of participants.


Formal Definition[edit]

Any cryptosystem based on a symmetric key cipher conforms to the following definition:

  • M : message to be enciphered
  • K : a secret key
  • E : enciphering function
  • D : deciphering function
  • C : enciphered message. C := E(M, K)
  • For all M, C, and K, M = D(C,K) = D(E(M,K),K)

Reciprocal Ciphers[edit]

Some shared-key ciphers are also "reciprocal ciphers." A reciprocal cipher applies the same transformation to decrypt a message as the one used to encrypt it. In the language of the formal definition above, E = D for a reciprocal cipher.

An example of a reciprocal cipher is Rot 13, in which the same alphabetic shift is used in both cases.

Symmetric Cypher Advantages[edit]

Symmetric key ciphers are typically much less computational overhead Overhead_(computing) then Asymmetric ciphers, sometimes this difference in computing overhead per character can be several orders of magnitude[1]. As such they are still used for bulk encryption of flies and data streams online applications.

Use[edit]

To st up a secure communication session Session_key between two parties the following actions take place Transport_Layer_Security:

  1. Alice tells Bob in t the Clear that she wants a secure connection.
  2. Bob generates a single use(session), public/private (asymmetric)key pair (Kpb Kpr).
  3. Alice generates a single use (session) symmetric key this will be the shares secret (Ks).
  4. Bob sends Alice the public key (Kpb).
  5. Alice encrypts her shared session key Ks with the Public key Kpb Ck := E(Ks, Kpb) and sends it to Bob
  6. Bob decrypts the the message with his private key to obtains the shared session key Ks := D(Ck, Kpr)
  7. Now Alice and Bob have a shares secret (symmetric key) to secure communication on this connection for this session
  8. Either party can encrypt a message simply by C := E(M, Ks) and decrypt is by M = D(C,K) = D(E(M,Ks),Ks)

This is the Basis for Diffie–Hellman Diffie%E2%80%93Hellman_key_exchange key exchange Key exchange and its more advanced successors Transport_Layer_Security.

Examples[edit]


Further Reading[edit]

Symmetric-key algorithm


This page or section of the Cryptography book is a stub. You can help Wikibooks by expanding it.

  1. http://s3.amazonaws.com/academia.edu.documents/33551175/IJETAE_1211_02.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1499689317&Signature=EavACFmNNlzcPXDa5kVZS9rh7Yw%3D&response-content-disposition=inline%3B%20filename%3DDES_AES_and_Blowfish_Symmetric_Key_Crypt.pdf
  2. https://www.schneier.com/blog/archives/2004/10/the_legacy_of_d.html
  3. https://www.schneier.com/academic/blowfish/
  4. https://books.google.com/books?hl=en&lr=&id=fNaoCAAAQBAJ&oi=fnd&pg=PA1&dq=speed+advantages+in+symmetric+ciphers+aes&ots=7hPPzLQjm5&sig=kaBEJW49jdonFWKin0-p6ZhROCA#v=onepage&q=speed%20advantages%20in%20symmetric%20ciphers%20aes&f=false
  5. http://s3.amazonaws.com/academia.edu.documents/33551175/IJETAE_1211_02.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1499689317&Signature=EavACFmNNlzcPXDa5kVZS9rh7Yw%3D&response-content-disposition=inline%3B%20filename%3DDES_AES_and_Blowfish_Symmetric_Key_Crypt.pdf