Symmetrickey algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption etc.
The encryption key is trivially related to the decryption key, in that they may be identical or there is a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.
Other terms for symmetrickey encryption are secretkey, singlekey, sharedkey, onekey, and privatekey encryption. Use of the last and first terms can create ambiguity with similar terminology used in publickey cryptography.
Types of symmetrickey algorithms Edit
Symmetrickey algorithms can be divided into stream ciphers and block ciphers. Stream ciphers encrypt the bits of the message one at a time, and block ciphers take a number of bits and encrypt them as a single unit. Blocks of 64 bits have been commonly used. The Advanced Encryption Standard (AES) algorithm approved by NIST in December 2001 uses 128bit blocks.
Some examples of popular and wellrespected symmetric algorithms include Twofish, Serpent, AES (Rijndael), Blowfish, CAST5, RC4, TDES, and IDEA.
Cryptographic primitives based on symmetric ciphers Edit
Symmetric ciphers are often used to achieve other cryptographic primitives than just encryption.
Encrypting a message does not guarantee that this message is not changed while encrypted. Hence often a message authentication code is added to a ciphertext to ensure that changes to the ciphertext will be noted by the receiver. Message authentication codes can be constructed from symmetric ciphers (e.g. CBCMAC).
However, symmetric ciphers also can be used for nonrepudiation purposes by ISO 138882 standard.
Another application is to build hash functions from block ciphers. See oneway compression function for descriptions of several such methods.
Construction of symmetric ciphers Edit
 Main article: Feistel cipher
Many modern block ciphers are based on a construction proposed by Horst Feistel. Feistel's construction allows to build invertible functions from other functions that are themselves not invertible.
Security of symmetric ciphers Edit
Symmetric ciphers have historically been susceptible to knownplaintext attacks, chosen plaintext attacks, differential cryptanalysis and linear cryptanalysis. Careful construction of the functions for each round can greatly reduce the chances of a successful attack.
Key generation Edit
When used with asymmetric ciphers for key transfer, pseudorandom key generators are nearly always used to generate the symmetric cipher session keys. However, lack of randomness in those generators or in their initialization vectors is disastrous and has led to cryptanalytic breaks in the past. Therefore, it is essential that an implementation uses a source of high entropy for its initialization.
See also Edit
Notes Edit

ca:Criptografia simètrica cs:Symetrická kryptografie de:Symmetrisches Kryptosystem el:Κρυπτογράφηση Συμμετρικού Κλειδιού es:Criptografía simétrica eo:Simetria ĉifro eu:Kriptografia simetriko fa:الگوریتم کلید متقارن fr:Cryptographie symétrique it:Crittografia simmetrica he:צופן סימטרי lt:Simetrinio rakto kriptografija nl:Symmetrische cryptografie ja:共通鍵暗号 pl:Algorytm symetryczny pt:Algoritmo de chave simétrica ru:Симметричные криптосистемы simple:Symmetrickey algorithm sk:Symetrická šifra sv:Symmetrisk kryptering uk:Шифрування з симетричними ключами vi:Thuật toán khóa đối xứng