U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

symmetric key

Abbreviation(s) and Synonym(s):

Secret key

Definition(s):

  A cryptographic key that is used to perform both the cryptographic operation and its inverse, for example to encrypt and decrypt, or create a message authentication code and to verify the code.
Source(s):
CNSSI 4009-2015 from NIST SP 800-63-2
NIST SP 800-63-2 [Superseded] under Symmetric Key

  A cryptographic key used by one or more (authorized) entities in a symmetric-key cryptographic algorithm; the key is not made public.
Source(s):
NIST SP 800-133 Rev. 2 under Secret key
NIST SP 800-133 [Superseded] under Secret key
NIST SP 800-133 Rev.1 [Superseded] under Secret key

  See Secret key.
Source(s):
NIST SP 800-152 under Symmetric key
NIST SP 800-133 Rev. 2 under Symmetric key
NIST SP 800-133 [Superseded] under Symmetric key
NIST SP 800-133 Rev.1 [Superseded] under Symmetric key

  A cryptographic key used by a secret-key (symmetric) cryptographic algorithm and that is not made public.
Source(s):
NIST SP 800-152 under Secret key

  A cryptographic key used to perform both the cryptographic operation and its inverse. For example, to encrypt and decrypt or create a message authentication code and to verify the code.
Source(s):
NIST SP 800-63-3 under Symmetric Key

  A cryptographic key that is shared between two or more entities and used with a cryptographic application to process information.
Source(s):
NIST SP 800-56B Rev. 2 under Symmetric key

  A single cryptographic key that is used by one or more entities with a symmetric key algorithm.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Symmetric key

  A single cryptographic key that is used with a symmetric (secret key) cryptographic algorithm and is not made public (i.e., the key is kept secret). A secret key is also called a symmetric key.
Source(s):
NIST SP 800-175B Rev. 1 under Secret key

  The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-175B Rev. 1 under Secret key

  Compare with a private key, which is used with a public-key (asymmetric-key) algorithm.
Source(s):
NIST SP 800-175B Rev. 1 under Secret key

  A single cryptographic key that is used with a symmetric (secret key) algorithm, is uniquely associated with one or more entities, and is not made public (i.e., the key is kept secret); a symmetric key is often called a secret key.
Source(s):
NIST SP 800-175B Rev. 1 under Symmetric key

  A single cryptographic key that is used with a symmetric-key cryptographic algorithm, is uniquely associated with one or more entities and is not made public (i.e., the key is kept secret). A secret key is also called a Symmetric key. The use of the term “secret” in this context does not imply a classification level but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Secret key

  A single cryptographic key that is used with a symmetric-key cryptographic algorithm, is uniquely associated with one or more entities, and is not made public (i.e., the key is kept secret). A symmetric key is often called a secret key. See Secret key.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Symmetric key

  A single cryptographic key that is used with a secret (symmetric) key algorithm.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded] under Symmetric key
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Symmetric key
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Symmetric key

  A cryptographic key that is used with a secret-key (symmetric) cryptographic algorithm that is uniquely associated with one or more entities and is not made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Secret key
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Secret key

  A cryptographic key that is used with a secret key (also known as a symmetric key) cryptographic algorithm that is uniquely associated with one or more entities and shall not be made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Secret key

  A single cryptographic key that is shared by both originator and recipient (see symmetric key algorithm)
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Symmetric key