什么是色拉油| 胃胀是什么感觉| 长期喝酒有什么危害| fb是什么意思| 知我者莫若你什么意思| 车厘子与樱桃有什么区别| 胎儿股骨长是什么意思| 后期是什么意思| 什么是氙气| 喝酒为什么会头疼| 青蛙长什么样| 口食读什么| 什么水果含糖量高| 盆腔积液什么症状| 铁蛋白高是什么意思| 连襟是什么关系| 2024年属龙的是什么命| 途明是什么档次的包| 元参别名叫什么| aurora是什么牌子| 臭虫怕什么东西| 掉头发是什么原因引起的| esrd医学上是什么意思| 鳄鱼吃什么食物| 玛瑙对人体有什么好处| 出冷汗是什么原因| 鹅梨帐中香是什么| 金酒兑什么好喝| 老是觉得口渴是什么原因引起的| 什么的梦| 人的三观是什么| 农历10月份是什么星座| 什么东西解腻| 突然头晕恶心是什么原因| ca医学上是什么意思| 产后复查挂什么科| 人的反义词是什么| 脚后跟疼痛是什么原因| 劣质是什么意思| 长寿花什么时候扦插| 笔记本电脑什么品牌好| ca什么意思| affairs是什么意思| 喉咙长息肉有什么症状| 保税仓是什么意思| 梦见古墓是什么意思| 什么是水晶| 龟头炎用什么药| 细菌性毛囊炎用什么药| 麻醉学学什么| 培根肉是什么肉| 糖尿病是什么原因造成的| 舌根白苔厚是什么原因| 黑加仑是什么| 鹿鞭泡酒有什么功效| 腊八蒜用什么醋比较好| 复印病历需要什么证件| 难产是什么意思| 双侧乳腺结构不良什么意思| 在所不辞是什么意思| 速干裤是什么面料| 皮肤科属于什么科室| 杂是什么意思| 大卡是什么意思| 中秋节适合吃什么菜| 脱疽是什么意思| qq是什么| 低密度脂蛋白高吃什么药| 甲状腺双叶回声欠均匀是什么意思| 加拿大现在是什么时间| 脑梗能吃什么| ed什么意思| 蓝精灵是什么意思| 身上长黑痣是什么原因| 88什么意思| 浮木是什么意思| 外阴病变有什么症状| 梦见以前的朋友是什么意思| 腹部痛是什么原因| 高铁跟动车有什么区别| 后背疼是什么病的前兆| 易蒙停是什么药| 肾虚吃什么食物| 恺字五行属什么| 佐助是什么意思| 指什么| 嗳气打嗝吃什么药| 酒精过敏吃什么药| 欧诗漫适合什么年龄| 六月二十七是什么日子| 时间单位是什么| 控诉是什么意思| 谨言慎行下一句是什么| 介入科主要看什么病| 睡眠不好什么原因| 口苦口干吃什么药最好| 吃什么补血小板| 十二月二号是什么星座| 垂是什么意思| 什么是根管治疗牙齿| 小孩经常肚子疼是什么原因| 孤辰寡宿是什么意思| 骨折移位有什么感觉| 便秘吃什么药效果好| 尿检4个加号什么意思| cc是什么意思啊| 梦见离家出走是什么意思| 剑走偏锋是什么意思| 东北易帜是什么意思| 腋臭和狐臭有什么区别| 副军级是什么军衔| 安之若素什么意思| 拉青色大便是什么原因| 红颜知己的意思是什么| 梦见很多小孩是什么意思| 幽门螺旋杆菌有什么症状| 采耳是什么意思| 带银子发黑是什么原因| 恶心想吐肚子疼是什么原因| 肝硬化吃什么好| 眼晴干涩模糊用什么药| 什么的小毛虫| 爸爸的爸爸叫什么儿歌| 什么是211大学| 长字五行属什么| 劳改是什么意思| nt检查前需要注意什么| 敢是什么意思| 血氧是什么| 土阜念什么| 草莓什么时候种| 怀孕血糖高有什么症状| 一片狼藉是什么意思| 酵母菌是什么菌| 吃什么长胎| 康熙的儿子叫什么| 4月4日是什么星座| 甲状腺滤泡性肿瘤是什么意思| 平安对什么| 什么情况下需要打破伤风针| 肾虚会导致什么| 边缘性人格障碍是什么| dw手表属于什么档次| 大便潜血弱阳性是什么原因| gmp是什么意思| span是什么意思| 有什么作用| 为什么会得尿道炎| 黄金发红是什么原因| 湿疹吃什么中药| 夏季摆摊卖什么好| 好是什么意思| 很无奈是什么意思| 阳光明媚是什么意思| 辣椒有什么营养价值| 脑炎是什么症状| 男性肾虚有什么症状| 跳梁小丑指什么生肖| 五福是什么| 别名是什么意思| 着床出血是什么意思| 大肠杆菌感染吃什么药| 水车是什么意思| 腹泻拉稀水吃什么药| 核子是什么| 来大姨妈为什么会拉肚子| 什么是pid| 什么人不能喝丹参| ab型血可以给什么血型输血| pct什么意思| 莲子有什么作用| 痛风为什么要禁欲| 防晒霜和防晒乳有什么区别| 什么叫轻度脂肪肝| 青口是什么东西| 羊肉和什么不能一起吃| 8.11是什么星座| 依西美坦最佳服用时间是什么时间| 脑供血不足检查什么项目| 三点水弘读什么| 治疗静脉曲张有什么药| 早晨起来口干舌燥是什么原因| 什么辉煌四字词语| 拉黄尿是什么原因| professional是什么意思| 口了又一是什么字| 什么米好吃| 双鱼座最配什么星座| 旭日东升是什么生肖| laurel是什么牌子| 9.30号是什么星座| 拍胸片挂什么科室| 呼吸困难胸闷气短挂什么科| 2019什么年| 总是干咳是什么原因| 栀子花什么时候修剪| 什么样的人能镇住凶宅| 左眼皮老是跳是什么原因| 持续是什么意思| 烧高香是什么意思| 全科医生是什么意思| 双性人什么意思| cheese什么意思| 卖关子是什么意思| 眼皮发肿是什么原因| 磷高吃什么药| 为什么要做微信营销| 木马是什么意思| 肠道功能紊乱吃什么药| 肾功能不全是指什么| 毛很长的狗是什么品种| 什么食物可以化解结石| 1990年是什么命| 口球是什么| 胃病可以吃什么水果| 伤寒是什么病| lee中文叫什么| 竹升面是什么面| 1993年什么命| 为什么会长结石| 萤火虫为什么会发光简单回答| 腹部胀疼是什么原因| 为什么医生都不体检| 耳堵耳闷是什么原因| 土土心念什么| 郑和下西洋是什么朝代| 什么是地沟油| 经常打屁是什么原因| 宋朝前面是什么朝代| simon什么意思| 肚子疼拉肚子挂什么科| 砥砺前行什么意思| 柴鱼是什么鱼| 唇炎属于什么科| 女人下面长什么样| 什么食物容易消化| 什么万| 谆谆教诲什么意思| 此加石念什么| 什么原因导致有幽门杆菌| 2222是什么意思| ms.是什么意思| 女生下面是什么味道| 七月份吃什么水果| 顶嘴是什么意思| 多吃西瓜有什么好处| 感冒没胃口吃什么好| 用什么可以解开所有的谜| 芸字五行属什么| 直爽是什么意思| 人妖是什么| 梦到男孩子是什么意思| 多囊有什么危害| 北极熊为什么不怕冷| 绿豆煮出来为什么是红色的| 干净的反义词是什么| 什么是周边| 下巴发黑是什么原因| 从什么时候开始| rmb是什么货币| 礼金是什么意思| 什么情况会胎停| 盆腔炎检查什么项目| 古代质子是什么意思| 百度Jump to content

渤海银行QDII产品落地 托管业务全球化升级

From Wikipedia, the free encyclopedia
Symmetric-key encryption: the same key is used for both encryption and decryption
百度 当他来到深山时,巧遇阿罗汉,便请求阿罗汉收他为弟子。

Symmetric-key algorithms[a] are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys.[1] The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.[2] The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption (also known as asymmetric-key encryption).[3][4] However, symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.[5][6][7]

Types

[edit]

Symmetric-key encryption can use either stream ciphers or block ciphers.[8]

Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one at a time. An example is ChaCha20. Substitution ciphers are well-known ciphers, but can be easily decrypted using a frequency table.[9]

Block ciphers take a number of bits and encrypt them in a single unit, padding the plaintext to achieve a multiple of the block size. The Advanced Encryption Standard (AES) algorithm, approved by NIST in December 2001, uses 128-bit blocks.

Implementations

[edit]

Examples of popular symmetric-key algorithms include Twofish, Serpent, AES (Rijndael), Camellia, Salsa20, ChaCha20, Blowfish, CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer, and IDEA.[10]

Use as a cryptographic primitive

[edit]

Symmetric ciphers are commonly used to achieve other cryptographic primitives than just encryption.[citation needed]

Encrypting a message does not guarantee that it will remain unchanged while encrypted. Hence, often a message authentication code is added to a ciphertext to ensure that changes to the ciphertext will be noted by the receiver. Message authentication codes can be constructed from an AEAD cipher (e.g. AES-GCM).

However, symmetric ciphers cannot be used for non-repudiation purposes except by involving additional parties.[11] See the ISO/IEC 13888-2 standard.

Another application is to build hash functions from block ciphers. See one-way compression function for descriptions of several such methods.

Construction of symmetric ciphers

[edit]

Many modern block ciphers are based on a construction proposed by Horst Feistel. Feistel's construction makes it possible to build invertible functions from other functions that are themselves not invertible.[citation needed]

Security of symmetric ciphers

[edit]

Symmetric ciphers have historically been susceptible to known-plaintext attacks, chosen-plaintext attacks, differential cryptanalysis and linear cryptanalysis. Careful construction of the functions for each round can greatly reduce the chances of a successful attack.[citation needed] It is also possible to increase the key length or the rounds in the encryption process to better protect against attack. This, however, tends to increase the processing power and decrease the speed at which the process runs due to the amount of operations the system needs to do.[12]

Most modern symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography.[13] Quantum computers would exponentially increase the speed at which these ciphers can be decoded; notably, Grover's algorithm would take the square-root of the time traditionally required for a brute-force attack, although these vulnerabilities can be compensated for by doubling key length.[14] For example, a 128 bit AES cipher would not be secure against such an attack as it would reduce the time required to test all possible iterations from over 10 quintillion years to about six months. By contrast, it would still take a quantum computer the same amount of time to decode a 256 bit AES cipher as it would a conventional computer to decode a 128 bit AES cipher.[15] For this reason, AES-256 is believed to be "quantum resistant".[16][17]

Key management

[edit]

Key establishment

[edit]

Symmetric-key algorithms require both the sender and the recipient of a message to have the same secret key. All early cryptographic systems required either the sender or the recipient to somehow receive a copy of that secret key over a physically secure channel.

Nearly all modern cryptographic systems still use symmetric-key algorithms internally to encrypt the bulk of the messages, but they eliminate the need for a physically secure channel by using Diffie–Hellman key exchange or some other public-key protocol to securely come to agreement on a fresh new secret key for each session/conversation (forward secrecy).

Key generation

[edit]

When used with asymmetric ciphers for key transfer, pseudorandom key generators are nearly always used to generate the symmetric cipher session keys. However, lack of randomness in those generators or in their initialization vectors is disastrous and has led to cryptanalytic breaks in the past. Therefore, it is essential that an implementation use a source of high entropy for its initialization.[18][19][20]

Reciprocal cipher

[edit]

A reciprocal cipher is a cipher where, just as one enters the plaintext into the cryptography system to get the ciphertext, one could enter the ciphertext into the same place in the system to get the plaintext. A reciprocal cipher is also sometimes referred as self-reciprocal cipher.[21][22]

Practically all mechanical cipher machines implement a reciprocal cipher, a mathematical involution on each typed-in letter. Instead of designing two kinds of machines, one for encrypting and one for decrypting, all the machines can be identical and can be set up (keyed) the same way.[23]

Examples of reciprocal ciphers include:

The majority of all modern ciphers can be classified as either a stream cipher, most of which use a reciprocal XOR cipher combiner, or a block cipher, most of which use a Feistel cipher or Lai–Massey scheme with a reciprocal transformation in each round.[citation needed]

Notes

[edit]
  1. ^ Other terms for symmetric-key encryption are secret-key, single-key, shared-key, one-key, and private-key encryption. Use of the last and first terms can create ambiguity with similar terminology used in public-key cryptography. Symmetric-key cryptography is to be contrasted with asymmetric-key cryptography.

References

[edit]
  1. ^ Kartit, Zaid (February 2016). "Applying Encryption Algorithms for Data Security in Cloud Storage, Kartit, et al". Advances in Ubiquitous Networking: Proceedings of UNet15: 147. ISBN 9789812879905.
  2. ^ Delfs, Hans; Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications. Springer. ISBN 9783540492436.
  3. ^ Mullen, Gary; Mummert, Carl (2007). Finite fields and applications. American Mathematical Society. p. 112. ISBN 9780821844182.
  4. ^ "Demystifying symmetric and asymmetric methods of encryption". Geeks for Geeks. 2025-08-06.
  5. ^ Johnson, Leighton (2016), "Security Component Fundamentals for Assessment", Security Controls Evaluation, Testing, and Assessment Handbook, Elsevier, pp. 531–627, doi:10.1016/b978-0-12-802324-2.00011-7, ISBN 9780128023242, S2CID 63087943, retrieved 2025-08-06
  6. ^ Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio (2025-08-06). "Algorithms for Lightweight Key Exchange". Sensors. 17 (7): 1517. doi:10.3390/s17071517. ISSN 1424-8220. PMC 5551094. PMID 28654006.
  7. ^ Bernstein, Daniel J.; Lange, Tanja (2025-08-06). "Post-quantum cryptography". Nature. 549 (7671): 188–194. Bibcode:2017Natur.549..188B. doi:10.1038/nature23461. ISSN 0028-0836. PMID 28905891. S2CID 4446249.
  8. ^ Pelzl & Paar (2010). Understanding Cryptography. Berlin: Springer-Verlag. p. 30. Bibcode:2010uncr.book.....P.
  9. ^ Bellare, Mihir; Rogaway, Phillip (2005). Introduction to Modern Cryptography (PDF).
  10. ^ Roeder, Tom. "Symmetric-Key Cryptography". www.cs.cornell.edu. Retrieved 2025-08-06.
  11. ^ "ISO/IEC 13888-2:2010". ISO. Retrieved 2025-08-06.
  12. ^ David R. Mirza Ahmad; Ryan Russell (2002). Hack proofing your network (2nd ed.). Rockland, MA: Syngress. pp. 165–203. ISBN 1-932266-18-6. OCLC 51564102.
  13. ^ Daniel J. Bernstein (2009). "Introduction to post-quantum cryptography" (PDF). Post-Quantum Cryptography.
  14. ^ Daniel J. Bernstein (2025-08-06). "Grover vs. McEliece" (PDF). {{cite journal}}: Cite journal requires |journal= (help)
  15. ^ Wood, Lamont (2025-08-06). "The Clock Is Ticking for Encryption". Computerworld. Retrieved 2025-08-06.
  16. ^ O'Shea, Dan (2025-08-06). "AES-256 joins the quantum resistance". Fierce Electronics. Retrieved 2025-08-06.
  17. ^ Weissbaum, Fran?ois; Lugrin, Thomas (2023), Mulder, Valentin; Mermoud, Alain; Lenders, Vincent; Tellenbach, Bernhard (eds.), "Symmetric Cryptography", Trends in Data Protection and Encryption Technologies, Cham: Springer Nature Switzerland, pp. 7–10, doi:10.1007/978-3-031-33386-6_2, ISBN 978-3-031-33386-6
  18. ^ Ian Goldberg and David Wagner. "Randomness and the Netscape Browser". January 1996 Dr. Dobb's Journal. quote: "it is vital that the secret keys be generated from an unpredictable random-number source."
  19. ^ Ristenpart, Thomas; Yilek, Scott (2010). "When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography" (PDF). NDSS Symposium 2010. Random number generators (RNGs) are consistently a weak link in the secure use of cryptography.
  20. ^ "Symmetric Cryptography". James. 2025-08-06.
  21. ^ Paul Reuvers and Marc Simons. Crypto Museum. "Enigma Uhr". 2009.
  22. ^ Chris Christensen. "Simple Substitution Ciphers". 2006.
  23. ^ Greg Goebel. "The Mechanization of Ciphers". 2018.
  24. ^ "... the true Beaufort cipher. Notice that we have reciprocal encipherment; encipherment and decipherment are identically the same thing." -- Helen F. Gaines. "Cryptanalysis: A Study of Ciphers and Their Solution". 2014. p. 121.
  25. ^ Greg Goebel. "The Mechanization of Ciphers". 2018.
  26. ^ Friedrich L. Bauer. "Decrypted Secrets: Methods and Maxims of Cryptology". 2006. p. 144
  27. ^ David Salomon. "Coding for Data and Computer Communications". 2006. p. 245
  28. ^ Greg Goebel. "US Codebreakers In The Shadow Of War". 2018.
胸疼是什么原因引起的 血精是什么原因 肠梗阻什么症状 晚上睡觉盗汗是什么原因 mpa是什么意思呀
百香果什么季节成熟 口腔溃疡什么症状 云肖是什么生肖 冬阴功是什么意思 今天什么冲什么
甲壳素是什么东西 疫苗是什么 猫需要打什么疫苗 脚踝扭伤挂什么科 绞股蓝长什么样
什么是头寸 属牛男和什么属相最配 什么面好吃 屈光和近视有什么区别 鼻窦炎是什么病
慢性盆腔炎吃什么药效果好baiqunet.com 1993年属鸡是什么命hcv7jop7ns0r.cn cm医学上是什么意思hcv8jop3ns0r.cn 水逆退散什么意思hcv9jop8ns3r.cn 女人排卵期是什么时候bjcbxg.com
本能反应是什么意思hcv9jop6ns2r.cn 人流需要准备什么东西hcv8jop3ns3r.cn 1996年属鼠五行属什么yanzhenzixun.com 夏天为什么不能喝中药hcv8jop2ns7r.cn 金字旁的字和什么有关hcv9jop0ns5r.cn
1997年是什么命hcv9jop2ns3r.cn 壶承是什么hcv8jop6ns3r.cn 喉咙嘶哑吃什么药hcv8jop6ns9r.cn 79年属什么的生肖hcv8jop2ns5r.cn 榆木脑袋是什么意思hcv9jop6ns3r.cn
疯狂动物城闪电是什么动物hcv9jop7ns1r.cn 毛泽东属相是什么hcv8jop7ns7r.cn reald厅什么意思hcv8jop5ns4r.cn 什么是uhcv8jop6ns1r.cn 一直干呕是什么原因sscsqa.com
百度