answersLogoWhite

0


Best Answer

Secure symmetric encryption requires that the required encryption key(s) be delivered to each authorized party securely. This may require out-of-band delivery of the key(s). Whatever the method of delivery, it needs to be secure.

It is also necessary to use keys and algorithms that cannot be broken without expending more resources than the value of the information being protected.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the two principle requirements for the secure use of symmetric encryption?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What does the word symmetric encryption mean?

The term "symmetric encryption" refers to a form of computerized cryptography that uses a singular encryption key to guise an electronic message so that it can be sent in a secure manner.


What does symmetrical mean The meaning?

The term "symmetric encryption" refers to a form of computerized cryptography that uses a singular encryption key to guise an electronic message so that it can be sent in a secure manner.


What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method?

You can actually use both; the problem with symmetric encryption is how to get the shared key to someone else in a secure manner.The problem with asymmetric encryption is that it is too slow to be used to general communications.So, using both can solve the problems of drawbacks to just using one or the other.


What is the most popular symmetric encryption system used over the Web?

The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public key encryption. Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys. These are limited-use symmetric keys for temporary communications; they allow two entities to conduct quick, efficient, secure communications based on symmetric encryption, which is more efficient than asymmetric encryption for sending messages. Diffie_Hellman provides the foundation for subsequent developments in public key encryption. It protects data from exposure to third parties, which is sometimes a problem when keys are exchanged out-of-land.


Which symmetric cipher is considered the most secure?

OTP


What happens with symmetric encryption?

Symmetric encryption is the process of encrypting and decrypting data via a single shared key. The process begins when the sender wants to trasnmit data in a secure fashion. Unencrypted data is ciphered with the shared secret key. The encrypted data is then sent to the receiving host via the internet or local resource. Once the receiver obtains the encrypted data, the receiver uses the same shared secret key to decipher the data. The receiver then has the same exact data unencrypted as the sender. The biggest advantage besides the security is that symmetric encryption is way faster than asymmetric encryption. The disadvantage is getting the shared secret key between the two parties without being tampered with or without being seen/heard by an unauthorized host.


What does ssl encryption stand for?

SSL encryption stands for "Secure Sockets Layer" encryption. It ensures secure encryption of data received and communicated to and from those accessing a website. It is important because many people will refuse to enter essentional information without the assurance of this security.


What encryption technology provides secure tunnels?

vpn


What type of encryption protocol does secure FTP SFTP use to secure FTP transmission?

Secure Shell Protocol


Which connection provides a secure CLI session with encryption to a Cisco switch?

To provide a secure CLI session with encryption to a Cisco switch an SSH or Secure Shell connection will be required as this uses a cryptographic network protocol that provides secure data communication.


What is a secure process for keeping confidential information private?

Encryption.


Is a secure process for keeping confidential information private?

Encryption.