Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

symmetric key

Abbreviation(s) and Synonym(s):

Secret key

Definition(s):

  A cryptographic key used by one or more (authorized) entities in a symmetric-key cryptographic algorithm; the key is not made public.
Source(s):
NIST SP 800-133 under Secret key

  A cryptographic key used by a secret-key (symmetric) cryptographic algorithm and that is not made public.
Source(s):
NIST SP 800-152 under Secret key

  A cryptographic key that is used with a secret-key (symmetric) cryptographic algorithm that is uniquely associated with one or more entities and is not made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Secret key [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Secret key

  A single cryptographic key that is used with a secret (symmetric) key algorithm.
Source(s):
NIST SP 800-56B Rev. 1 under Symmetric key
NIST SP 800-57 Part 1 Rev. 3 under Symmetric key [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Symmetric key

  A cryptographic key that is used to perform both the cryptographic operation and its inverse, for example to encrypt and decrypt, or create a message authentication code and to verify the code.
Source(s):
CNSSI 4009-2015 (NIST SP 800-63-2)
NIST SP 800-63-2 under Symmetric Key [Superseded]

  See Secret key.
Source(s):
NIST SP 800-133 under Symmetric key
NIST SP 800-152 under Symmetric key

  A single cryptographic key that is shared by both originator and recipient (see symmetric key algorithm)
Source(s):
NIST SP 800-57 Part 2 under Symmetric key

  A cryptographic key used to perform both the cryptographic operation and its inverse. For example, to encrypt and decrypt or create a message authentication code and to verify the code.
Source(s):
NIST SP 800-63-3 under Symmetric Key