# Symmetric Cipher

A Symmetric Cipher is cipher that uses shared key (shared secret between the two parties.

Because the key is shared, the cipher is said to be symmetric in contrario to asymmetric where the secret is known from only one side.

The most known symmetric cipher is the Advanced Encryption Standard (AES)

Encryption algorithms which use the same and single key for both encryption and decryption are known as:

• symmetric key algorithms.
• or secret-key encryption

## Usage

### Connection encryption

The symmetric cipher is quicker than an asymmetric one that's why they are generally used in a second phase of a SSL connection when the shared secret has been exchanged between the two parties via a connection encrypted by asymmetric cipher.

### Data encryption

Symmetric Cipher are also used in data transition. For instance, you may send an email verification with a link that has an encrypted payload. If the user clicks on the link, you receive the data and you can verify that it was the data you send.

## Symmetric postal analogy

• Alice would puts the secret message in a box
• Alice would lock the box using a padlock to which she has a key.
• Alice would send the box to Bob through regular mail.
• Bob would use an identical copy of Alice's key to open the box
• Bob would reads the message.
• Bob would use the same padlock to send his secret reply.

## Symmetric Concept

The single secret key must be shared and kept private by both:

• the sender (for encryption)
• and the receiver (for decryption).

To use a symmetric encryption scheme, the sender and receiver must securely share the key in advance. This is normally done after a connection is secured with an asymmetric cipher (because a symmetric cipher is less expensive in computational power). See section below asymmetric cipher.

Discover More
Cryptography - Advanced Encryption Standard (AES)

AES is a symmetric block cipher with a block size of 128-bit (16 octets) . Advanced_Encryption_Standard
Cryptography - Algorithm (called a Cipher)

A cipher is an algorithm that encrypt a plain text message into a ciphertext. Cipher algorithm can be categorized by the key that they used as parameters. No key symmetric one (using one key) ...
Cryptography - Encryption (Enciphering)

Encryption is the function of a cipher that transforms usable data into an unreadable form. It provides confidentiality if a secret is used in the encryption. There is two class of encryption. ...
Cryptography - Key

A key is a parameter used in a cipher algorithm that determines: the encryption operation (forward) and the decryption operation (backward). It's the only secret parameter that protect the anonymity...
Cryptography - Secret

A secret is a cryptographic material that should not be known by the public in order to secure the transaction. A secret is categorized as something you have authentication. It's also known as the private...
How does Single Sign-on (SSO) authentication work?

Single Sign-On (SSO, trusted sign-on) is a federation identity application. It's the ability: to require a user to sign once and gain access to different applications. SSO is also known as: as...
How to protect numerical Id ? (obfuscate, id encryption)

This page is how to obfuscate / protect a internal id. So that even if they are public, they cannot be guessed. This is mostly used to prevent guessing your data. For instance, you can estimate...
In OAuth, what is the state query parameter known as Local State?

The state query parameter is an opaque value used by the client (app) in redirection flow to maintain the state between the and (response) (ie to restore or continue the navigation of the user). ...
What is Sender authentication ? (Public Key Authentication based, Certificate-based in Cryptography)

Sender Authentication is based on the digital signature. If you can decrypt the signature successfully, it proves that the message come from: a particular sender or group There is three type of...
What is a Digital Signature? (Signing in Cryptography)

A digital signature is: a hash of a message created with a secret Digital signature schemes are used for: sender authentication (no one can impersonate the sender, it proves that the message...