Symmetric Algorithm

honggarae 11/05/2022 498

Principle

Theencryptionanddecryptionofthesymmetricalgorithmisexpressedas:

Ek(M)=C

Dk(C)=M

Symmetricalgorithmscanbedividedintotwocategories.Analgorithmthatonlyoperatesonasinglebit(sometimesabyte)intheplaintextatatimeiscalledasequencealgorithmorasequencecipher.Anothertypeofalgorithmistoperformoperationsonagroupofbitsintheplaintext.Thesegroupsofbitsarecalledgrouping,andthecorrespondingalgorithmiscalledagroupingalgorithmorablockcipher.Thetypicalpacketlengthofmoderncomputercryptographicalgorithmsis64bits-thislengthislargeenoughtopreventanalysisanddeciphering,butsmallenoughtofacilitateitsuse.

Thisalgorithmhasthefollowingcharacteristics:

Dk(Ek(M))=M

Symmetric Algorithm

Thereare5commonlyusedencryptionschemesusingsymmetriccryptographyComponents:

1)Plaintext:originalinformation.

2)Encryptionalgorithm:Usethekeyasaparametertoperformmultiplereplacementandconversionrulesandstepsontheplaintext,andtheresultoftheconversionisciphertext.

3)Key:Theparametersofencryptionanddecryptionalgorithmsdirectlyaffecttheresultoftransformingtheplaintext.

4)Ciphertext:Theresultoftransformingtheplaintext.

5)Decryptionalgorithm:Inversetransformationofencryptionalgorithm,withciphertextasinputandkeyasparameters,andthetransformationresultisplaintext.

Features

Theadvantagesofsymmetriccryptographyarehighefficiency(encryption/decryptionspeedcanreachtensofmegabytespersecondormore),simplealgorithm,lowsystemoverhead,suitableforlargenumbersofencryptiondata.

Defects

Althoughsymmetriccryptographyhassomegoodcharacteristics,italsohasobviousdefects,including:

l)BeforeconductingsecurecommunicationThekeyexchangeneedstobedoneinasecuremanner.Thisstepisfeasibleundercertaincircumstances,butundercertaincircumstancesitwillbeverydifficultorevenimpossibletoachieve.

2)Complexscale.Forexample,thekeybetweenAandBmustbedifferentfromthekeybetweenAandC,otherwisethesecurityofthemessagetoBwillbethreatened.Inagroupof1000users,Aneedstokeepatleast999keys(moreprecisely,1000,ifsheneedstoleaveakeyforhimselftoencryptdata).Forotherusersinthegroup,thissituationalsoexists.Inthisway,thisgrouprequiresatotalofnearly500,000differentkeys!Byextension,agroupofnusersrequiresN2/2differentkeys.

Byapplyingacentralservicestructurebasedonsymmetriccryptography,theabove-mentionedproblemshavebeenalleviated.Inthissystem,anyuserinthegroupsharesakeywithacentralserver(usuallycalledakeydistributioncenter).Therefore,thenumberofkeysthatneedtobestoredisbasicallythesameasthenumberofpeopleinthegroup,andthecentralservercanalsoactasan"introducer"foruserswhodidnotknoweachotherbefore.However,thiscentralserver,whichiscloselyrelatedtosecurity,mustbeonlineatalltimes,becauseaslongastheservergoesoffline,communicationbetweenuserswillbeimpossible.Thismeansthatthecentralserveristhekeytothesuccessorfailureoftheentirecommunicationandthefocusofattacks.Italsomeansthatitisalsothe"bottleneck"ofahugeorganization'scommunicationservices

Latest: Digital signal

Next: political system