An Overview of Symmetric Encryption and the Key Lifecycle (2024)

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two types of symmetric algorithm, and the lifecycle and management of symmetric keys.

Introduction

Symmetric key algorithms (aka ciphers) are commonly used to protect the confidentiality of data, both at rest (e.g. in storage devices) and in transit (e.g. over networks). The term “symmetric” comes from the fact that the same key is used both for encryption and decryption. This contrasts to asymmetric encryption, where the encryption and decryption keys are different (but mathematically related).

Symmetric vs. asymmetric encryption

The main advantage of symmetric encryption over asymmetric encryptionis that it is fast and efficient for large amounts of data; the disadvantage is the need to keep the key secret - this can be especially challenging where encryption and decryption take place in different locations, requiring the key to be moved safely between locations.

Before the advent of public key cryptography (PKC) in the mid-1970s, it was necessary to distribute secret keys, or even entire code books, by secure means (e.g. a trusted courier). This can present significant challenges, especially in a wartime scenario where the couriers become targets for the enemy. If the secret keys (“red” keys in military parlance) are intercepted, then the enemy can decipher your communications or (if you’re aware of the interception) prevent you communicating sensitive information at all, thereby creating a denial-of-service.

The threat of interception can be mitigated by splitting a secret key into two or more components using a special algorithm and sending the components by separate couriers. The components can then be re- combined into the key at the other end. Intercepting a single component does not reveal the key.

An Overview of Symmetric Encryption and the Key Lifecycle (1)

Today, PKC (which is based on asymmetric algorithms) is most commonly used to share a secret key, which is then used by a symmetric algorithm to encrypt the data – this is known as hybrid encryption, as it combines both asymmetric and symmetric techniques. This enables a secure communication channel to be rapidly set up between two parties over an untrusted network, and is the basis for most Internet communications and electronic transactions today.

Nonetheless, the use of pure symmetric encryption may still be necessary (or even desirable) in some rare situations, especially in a military context where secret keys can be distributed by military personnel protected with guns - for example, due to the use of outdated systems or a distrust of PKC (particularly in light of the vulnerability of PKC to the threat of quantum computing).

Recently, quantum key distribution has been demonstrated as an alternative means to securely share a secret key between two parties – this technology uses light (e.g. fiber optics) to distribute a secret key and is based on the quantum nature of photons and the ability to detect whether they arrive without having been intercepted.

An Overview of Symmetric Encryption and the Key Lifecycle (2)Block ciphers

Symmetric algorithms fall into two categories – block ciphers and stream ciphers. Block ciphers such as DES and AES operate on a fixed-size block of data, encrypting the whole block (usually 64, 128 or 256 bits) using a cryptographic key (a minimum of 112 bits long to be secure today).

Most block ciphers are based on a “Fiestel network”, named after the IBM cryptographer Horst Fiestel. This design has the advantage that encryption and decryption operations are very similar, even identical in some cases, making it efficient to implement in either hardware or software. To further simplify implementation, Feistel networks use iterations based on an internal function called a “round function”.

A round consists of several processing steps that include substitution, transposition and mixing of the input plaintext to transform it into ciphertext. Algorithms use many rounds to reduce their vulnerability to attack. The substitution aspect is governed by an “S-box”, essentially a look-up table that may be either fixed or generated dynamically from the key. This is an intrinsic part of the algorithm and changing the S-box will fundamentally change its cryptographic characteristics, but a cryptographic expert could potentially modify the S-box to create unique variants of an algorithm.

Stream ciphers

Stream ciphers such as RC4 encrypt the plaintext one bit at a time and require a key in the form of a pseudo-random bit stream (PRBS) – this must be the same for encryption and decryption, hence the need for a secret key to seed the PRBS. Stream ciphers are less commonly used than block ciphers, as the latter offer certain security benefits – specifically, they feature high diffusion (i.e. information from one plaintext symbol is diffused into several ciphertext symbols) and immunity to tampering (i.e. it is difficult to insert symbols into the ciphertext without detection).

The very earliest ciphers, namely simple substitution ciphers, were stream ciphers. The ultimate encryption system is also a type of stream cipher – it uses a “one-time pad”, which is a string of random data that is as long as the plaintext message it is used to encrypt. This is very fast and the only encryption method that is mathematically 100% secure, provided that the one-time pad is truly random and that it is kept secret. For most purposes, it is impractical to generate and use a key that is as long as the plaintext data, not to mention the challenge of sharing it secretly between the sender and recipient.

The lifecycle and management of keys

As can be seen from the foregoing, keys are a critical component of modern cryptography. Without keys, cryptography depends on the algorithm itself being secret, whereas using keys means that the algorithm can be fully known to an attacker, as long as the keys (i.e. symmetric keys or asymmetric private keys) are kept secret. Thus, strong algorithms can be developed and used by everyone.

It is also vitally important that keys are completely random, as any non-randomness reduces the effective strength of the encryption, and that they are “rotated” on a regular basis in keeping with best practice. The generation, protection, rotation, distribution and eventual retirement of keys, collectively known as the “key lifecycle”, must therefore be handled with the utmost care, especially keys used to protect particularly sensitive or valuable data (e.g. personal information, financial transactions, etc.).

Modern key management systems are designed for this purpose, enabling keys to be pro-actively managed throughout their entire life-cycle. Keys are typically generated and protected by special hardware devices called hardware security modules (HSMs) that are independently certified to standards such as FIPS 140-2, Common Criteria or PCI-HSM. Key management systems also maintain secure audit logs to keep track of the keys.

Keys can be securely distributed to wherever they are needed by encrypting them under a pre-shared transport key (aka key encryption key, or KEK); the transport key may be either a symmetric or asymmetric key. Note that such a hierarchical system results in even more keys that must be correctly managed. Alternatively, a secret key can be distributed manually by “splitting” the key, with each key component entrusted to a different individual.


In the next article in this series, we will look at the development of symmetric key algorithms and therange of algorithms available today along with their strengths and weaknesses, as well as the
importance of crypto agility.

An Overview of Symmetric Encryption and the Key Lifecycle (3)

References and Further Reading

  • (2017), byAsim Mehmood
  • Symmetric Key Encryption - why, where and how it’s used in banking(2019), byPeter Smirnoff & Dawn M. Turner
  • Classification of Cryptographic Keys(2018), by Rob Stubbs
  • Cryptographic Key Management - the Risks and Mitigation(2018),by Rob Stubbs
  • Key Management – A Question of Ownership(2018),by Rob Stubbs
  • Selecting the right Key Management System(2019), byDawn M. Turner
  • Strong cryptography and key management requirements for EMV and PCI DSS compliance(2017), byDawn M. Turner

Cover Image: "hallway" by courtesy of Kai Pilger(pexels.com,CC BY 2.0)

An Overview of Symmetric Encryption and the Key Lifecycle (2024)

FAQs

What is the lifecycle of an encryption key? ›

Key Lifecycle Management includes creating, maintaining, protecting, and deleting cryptographic keys. Keys expire or become vulnerable over a period. Their shelf life decreases because of continuous usage and an increased number of authorized users.

What is symmetric encryption simply explained? ›

Symmetric encryption uses one key to encrypt and decrypt. If you encrypt a zip file and then decrypt with the same key, you are using symmetric encryption. Symmetric encryption is also called “secret key” encryption: the key must be kept secret from third parties.

What is symmetric cryptography overview? ›

It is called symmetric because, it makes use of the same key for both encryption of plain text (sending message) and decryption of cipher text (received message). That is, a single key known as secret key is shared between the sender and the receiver.

What is symmetric encryption Quizlet? ›

Symmetric Encryption. - a common encryption method that involves using the same key to encrypt and decrypt the message. - it has other names like: - Shared or Preshared Key. - Secret Key.

What are the 3 types of encryption keys? ›

There are different types of encryption techniques, but the following three are the most common and widely used: Symmetric Encryption, Asymmetric Encryption, and Hashing.

What are the three phases of the cryptographic lifecycle? ›

- Pre-operational: The keying material is not yet available for normal cryptographic operations. Operational: The keying material is available and in normal use. - Post-operational: The keying material is no longer in normal use, but access to the material is possible.

What is an example of a symmetric key encryption? ›

Common Symmetric Encryption Algorithms are widely used in securing data and communications. Examples of these algorithms include Advanced Encryption Standard (AES), Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and Blowfish.

What is the problem with symmetric key encryption? ›

One big issue with using symmetric algorithms is the key exchange problem, which can present a classic catch-22. The other main issue is the problem of trust between two parties that share a secret symmetric key. Problems of trust may be encountered when encryption is used for authentication and integrity checking.

How is a key shared in symmetric encryption? ›

Symmetric-key algorithms require both the sender and the recipient of a message to have the same secret key. All early cryptographic systems required either the sender or the recipient to somehow receive a copy of that secret key over a physically secure channel.

What is the secret key encryption algorithm? ›

Secret-key cryptography is also called symmetric cryptography because the same key is used to both encrypt and decrypt the data. Well-known secret-key cryptographic algorithms include Advanced Encryption Standard (AES), Triple Data Encryption Standard (3DES), and Rivest Cipher 4 (RC4).

What are the two types of symmetric cryptography? ›

There are two types of symmetric algorithms (or ciphers): stream and block. A block cipher divides the data into blocks (often 64-bit blocks, but newer algorithms sometimes use 128-bit blocks) and encrypts the data one block at a time. Stream ciphers encrypt the data as a stream of bits, one bit at a time.

How can you make a symmetric encryption key more difficult to break? ›

To make symmetric encryption keys harder to break, increase the key length, limit its reuse, and utilize an initialization vector.

What is symmetric encryption in cryptography? ›

Symmetric encryption is a type of encryption key management solution where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.

What best describes symmetric encryption? ›

Symmetric encryption uses one key to encrypt and decrypt. If you encrypt a zip file, and then decrypt with the same key, you are using symmetric encryption. Symmetric encryption is also called “Secret key” encryption: the key must be kept secret from third parties.

Which of the following best explains how symmetric encryption? ›

Which of the following best explains how symmetric encryption algorithms are typically used? Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

What is the life cycle of cryptography? ›

The cryptographic lifecycle involves algorithm selection, key management, and the management of encrypted data at rest, in transit, and in storage. Algorithm selection involves a number of choices: The type of cryptology appropriate for the purpose (e.g. symmetric, public key, hashing, etc.)

Do encryption keys expire? ›

The expiration attribute configured for an encryption key identifies the expiration date and time after which the key must not be used anymore for a cryptographic operations.

How long is an encryption key? ›

Advanced Encryption Standard (AES) keys are symmetric keys that can be three different key lengths (128, 192, or 256 bits). AES is the encryption standard that is recognized and recommended by the US government. The 256-bit keys are the longest allowed by AES.

What is the key encryption process? ›

An encryption key is typically a random string of bits generated specifically to scramble and unscramble data. Encryption keys are created using algorithms designed to ensure that each key is unique and unpredictable. The longer the key constructed this way, the harder it is to break the encryption code.

Top Articles
Foraging for Wild Edibles
Marketing Agency: Meaning, Types & Advantages
What Is Single Sign-on (SSO)? Meaning and How It Works? | Fortinet
11 beste sites voor Word-labelsjablonen (2024) [GRATIS]
Nullreferenceexception 7 Days To Die
Watch Mashle 2nd Season Anime Free on Gogoanime
Words From Cactusi
12 Best Craigslist Apps for Android and iOS (2024)
Caroline Cps.powerschool.com
Dutchess Cleaners Boardman Ohio
979-200-6466
Rachel Griffin Bikini
Salem Oregon Costco Gas Prices
Everything We Know About Gladiator 2
Craigslist Missoula Atv
Evil Dead Rise - Everything You Need To Know
Loft Stores Near Me
Why Does Lawrence Jones Have Ptsd
UMvC3 OTT: Welcome to 2013!
Scheuren maar: Ford Sierra Cosworth naar de veiling
Project Reeducation Gamcore
Greyson Alexander Thorn
University Of Michigan Paging System
Jcp Meevo Com
Koninklijk Theater Tuschinski
Mals Crazy Crab
Blackboard Login Pjc
What Is a Yurt Tent?
Claio Rotisserie Menu
Pacman Video Guatemala
Meggen Nut
Gt7 Roadster Shop Rampage Engine Swap
Sam's Club Gas Price Hilliard
Bursar.okstate.edu
Www.craigslist.com Syracuse Ny
Bridger Park Community Garden
Cvb Location Code Lookup
Naya Padkar Newspaper Today
Top-ranked Wisconsin beats Marquette in front of record volleyball crowd at Fiserv Forum. What we learned.
Reborn Rich Ep 12 Eng Sub
The 50 Best Albums of 2023
USB C 3HDMI Dock UCN3278 (12 in 1)
3302577704
Oriellys Tooele
Brandon Spikes Career Earnings
Walmart Car Service Near Me
40X100 Barndominium Floor Plans With Shop
Myapps Tesla Ultipro Sign In
Runescape Death Guard
O'reilly's On Marbach
7 Sites to Identify the Owner of a Phone Number
Qvc Com Blogs
Latest Posts
Article information

Author: Mrs. Angelic Larkin

Last Updated:

Views: 6488

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Mrs. Angelic Larkin

Birthday: 1992-06-28

Address: Apt. 413 8275 Mueller Overpass, South Magnolia, IA 99527-6023

Phone: +6824704719725

Job: District Real-Estate Facilitator

Hobby: Letterboxing, Vacation, Poi, Homebrewing, Mountain biking, Slacklining, Cabaret

Introduction: My name is Mrs. Angelic Larkin, I am a cute, charming, funny, determined, inexpensive, joyous, cheerful person who loves writing and wants to share my knowledge and understanding with you.