answersLogoWhite

0


Best Answer

Twofish, Advanced Encryption Standard, Blowfish, Serpent, CAST 5, RC4, TDES, and IDEA are all examples of symmetric encryption methods. In short, any algorithm that uses the same or similar cryptographic keys for encryption and decryption is a symmetric encryption method. Symmetric encryption methods are also divided into two different categories, stream ciphers and block ciphers. These two encryption methods are much like the difference between an interpreter and a compiler in programming. Stream encrypts individual bytes one at a time, while Block encrypts volumes as a whole.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which cryptographic algorithms is a symmetric encryption method?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the two principle requirements for the secure use of symmetric encryption?

Secure symmetric encryption requires that the required encryption key(s) be delivered to each authorized party securely. This may require out-of-band delivery of the key(s). Whatever the method of delivery, it needs to be secure. It is also necessary to use keys and algorithms that cannot be broken without expending more resources than the value of the information being protected.


What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method?

You can actually use both; the problem with symmetric encryption is how to get the shared key to someone else in a secure manner.The problem with asymmetric encryption is that it is too slow to be used to general communications.So, using both can solve the problems of drawbacks to just using one or the other.


What encryption requires both sides of an encrypted conversation to use an encrypted key to be able to encode and decode the data?

Any shared private key method - symmetric encryption.


What is the most popular symmetric encryption system used over the Web?

The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public key encryption. Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys. These are limited-use symmetric keys for temporary communications; they allow two entities to conduct quick, efficient, secure communications based on symmetric encryption, which is more efficient than asymmetric encryption for sending messages. Diffie_Hellman provides the foundation for subsequent developments in public key encryption. It protects data from exposure to third parties, which is sometimes a problem when keys are exchanged out-of-land.


What is meant by SMOCK a scable method of cryptographic key management?

SMOCK is a scaleable way of managing cryptographic keys.


Is a method of translating data into code?

encryption


Most encryption software products use a method called?

Public-Key Encryption RSA Technology


What are the different encryption method?

stream ciphers and block ciphers


What has the author Mark T Jones written?

Mark T. Jones has written: 'Bunch-Kaufman factorization for real symmetric indefinite banded matrices' -- subject(s): Bunch-Kaufman algorithm, Matrices 'The use of Lanczos's method to solve the large generalized symmetric definite eigenvalue problem' -- subject(s): Algorithms, Buckling, Problem solving, Vibration, Eigenvalues, Structural engineering 'Factoring symmetric indefinite matrices on high-performance architectures' -- subject(s): Numerical analysis, Computer programs


What is point method ME?

Point method refers a class of algorithms aimed at solving linear and nonlinear convex optimization problems


What is the difference between white and blue sky card?

its the encryption method, the blue card receives encryption code about once every month or so, the white cards receives encryption code every 10 minutes.


How many different keys will be required to give four people the ability to encrypt and decrypt the message using a symmetric cryptography algorithm?

ONEAnswer Explanation: Only one key would be required for everyone to be able to encrypt and decrypt the message. Symmetric cryptography uses the same "shared secret" key for encrypting and decrypting a message. A message encrypted using a symmetric encryption algorithm can be decrypted by anyone with the key. For this reason it is very important to ensure that the key is protected from unauthorized use. One of the primary security issues surrounding the use of symmetric cryptography is the method used to transport the key to users who need it, as most forms of communication are susceptible to eavesdropping.