U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

symmetric key algorithm

Abbreviation(s) and Synonym(s): Definition(s):

  A cryptographic algorithm that uses the same secret key for its operation and, if applicable, for reversing the effects of the operation (e.g., an HMAC key for keyed hashing, or an AES key for encryption and decryption). Also known as a secret-key algorithm.
Source(s):
NIST SP 800-133 under Symmetric-key algorithm [Superseded]

  A cryptographic algorithm that uses a single secret key for different operations, such as for encryption and decryption.
Source(s):
NIST SP 800-56A Rev. 2 under Symmetric-key algorithm [Superseded]

  A cryptographic algorithm that uses the same secret key for an operation and its complement (e.g., encryption and decryption).
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Symmetric-key algorithm [Superseded]
NIST SP 800-57 Part 1 Rev. 3 under Symmetric-key algorithm [Superseded]

  A cryptographic algorithm that employs one shared key, a secret key.
Source(s):
NIST SP 800-57 Part 2 under Symmetric key algorithm [Superseded]

  A cryptographic algorithm that uses secret keying material that is shared between authorized parties.
Source(s):
NIST SP 800-56B Rev. 2 under Symmetric-key algorithm

  A cryptographic algorithm that employs the same secret key for an operation and its complement (e.g., encryption and decryption).
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Symmetric-key algorithm

  A cryptographic algorithm that uses the same secret key for its operation and, if applicable, for reversing the effects of the operation (e.g., an HMAC key for keyed hashing, or an AES key for encryption and decryption). Also known as a secret-key algorithm
Source(s):
NIST SP 800-133 Rev.1 under Symmetric-key algorithm [Superseded]

  A cryptographic algorithm that uses the same secret key for an operation and its complement (e.g., encryption and decryption). Also called a secret-key algorithm. See SP 800-185.13
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Symmetric-key algorithm

  A cryptographic algorithm that uses one secret key that is shared between authorized parties.
Source(s):
NIST SP 800-56B Rev. 1 under Symmetric-key algorithm [Superseded]