secret key algorithm (symmetric algorithm)
Also see cryptography.
A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data. The best known algorithm is the U.S. Department of Defense's Data Encryption Standard (DES). DES, which was developed at IBM in 1977, was thought to be so difficult to break that the U.S. government restricted its exportation.
Go Now: Malware Protection Best Practices
Should security teams clean up the malware and move on or format the hard drives to start over with a clean system? In this expert guide, security pros weigh in on how antimalware protects the enterprise.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
A very simple example of how a secret key algorithm might work might be substituting the letter in the alphabet prior to the target letter for each one in a message. The resulting text - "gdkkn," for example - would make no sense to someone who didn't know the algorithm used (x-1), but would be easily understood by the parties involved in the exchange as "hello."
The problem with secret or symmetric keys is how to securely get the secret keys to each end of the exchange and keep them secure after that. For this reason, an asymmetric key system is now often used that is known as the public key infrastructure (PKI).
Continue Reading About secret key algorithm (symmetric algorithm)
Dig Deeper on Disk and file encryption tools
PRO+
Content
Find more PRO+ content and other member only offers, here.
Start the conversation
0 comments