Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

symmetric key algorithm

Abbreviation(s) and Synonym(s):

None

Definition(s):

  A cryptographic algorithm that uses a single secret key for different operations, such as for encryption and decryption.
Source(s):
NIST SP 800-56A Rev. 2 under Symmetric-key algorithm

  A cryptographic algorithm that uses one secret key that is shared between authorized parties.
Source(s):
NIST SP 800-56B Rev. 1 under Symmetric-key algorithm

  A cryptographic algorithm that uses the same secret key for its operation and, if applicable, for reversing the effects of the operation (e.g., an HMAC key for keyed hashing, or an AES key for encryption and decryption). Also known as a secret-key algorithm.
Source(s):
NIST SP 800-133 under Symmetric-key algorithm

  A cryptographic algorithm that uses the same secret key for an operation and its complement (e.g., encryption and decryption).
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Symmetric-key algorithm [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Symmetric-key algorithm

  A cryptographic algorithm that employs one shared key, a secret key.
Source(s):
NIST SP 800-57 Part 2 under Symmetric key algorithm