symmetric key cryptography


Also found in: Acronyms, Encyclopedia, Wikipedia.

symmetric key cryptography

American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.
References in periodicals archive ?
The cryptography algorithms can be categorized as symmetric key cryptography and asymmetric key cryptography.
Cryptography is divided into two vital types: one is Symmetric key cryptography, and other is Asymmetric key cryptography.
In this paper, we propose a secure and highly efficient deduplicatable proof of storage scheme based on symmetric key cryptography, namely Sec-DPoS, which ensures data confidentiality with brute-force attack resilience and supports integrity auditing based on symmetric key cryptography.
Therefore, more sophisticated methods were designed to assure various levels of security, these methods are categorized as: Symmetric Key Cryptography (SKC) and Public Key Cryptography (PKC).
Among the topics are symmetric key cryptography, block ciphering, secure hashing, public key cryptosystems that underpin various internet standards, physically unclonable functions, random number generators, and side channel attacks.
Cryptography can be broadly classified as Symmetric Key Cryptography (SKC) and Asymmetric Key Cryptography (AKC).
Based on symmetric key cryptography and one way hash function, Song [9] suggested an efficient smart card authentication scheme and claimed that the scheme is secure against impersonation attack, parallel session attack, replay attack and modification attack.

Full browser ?