An Overview of Symmetric Encryption and the Key Lifecycle (2024)

In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two types of symmetric algorithm, and the lifecycle and management of symmetric keys.

Introduction

Symmetric key algorithms (aka ciphers) are commonly used to protect the confidentiality of data, both at rest (e.g. in storage devices) and in transit (e.g. over networks). The term “symmetric” comes from the fact that the same key is used both for encryption and decryption. This contrasts to asymmetric encryption, where the encryption and decryption keys are different (but mathematically related).

Symmetric vs. asymmetric encryption

The main advantage of symmetric encryption over asymmetric encryptionis that it is fast and efficient for large amounts of data; the disadvantage is the need to keep the key secret - this can be especially challenging where encryption and decryption take place in different locations, requiring the key to be moved safely between locations.

Before the advent of public key cryptography (PKC) in the mid-1970s, it was necessary to distribute secret keys, or even entire code books, by secure means (e.g. a trusted courier). This can present significant challenges, especially in a wartime scenario where the couriers become targets for the enemy. If the secret keys (“red” keys in military parlance) are intercepted, then the enemy can decipher your communications or (if you’re aware of the interception) prevent you communicating sensitive information at all, thereby creating a denial-of-service.

The threat of interception can be mitigated by splitting a secret key into two or more components using a special algorithm and sending the components by separate couriers. The components can then be re- combined into the key at the other end. Intercepting a single component does not reveal the key.

An Overview of Symmetric Encryption and the Key Lifecycle (1)

Today, PKC (which is based on asymmetric algorithms) is most commonly used to share a secret key, which is then used by a symmetric algorithm to encrypt the data – this is known as hybrid encryption, as it combines both asymmetric and symmetric techniques. This enables a secure communication channel to be rapidly set up between two parties over an untrusted network, and is the basis for most Internet communications and electronic transactions today.

Nonetheless, the use of pure symmetric encryption may still be necessary (or even desirable) in some rare situations, especially in a military context where secret keys can be distributed by military personnel protected with guns - for example, due to the use of outdated systems or a distrust of PKC (particularly in light of the vulnerability of PKC to the threat of quantum computing).

Recently, quantum key distribution has been demonstrated as an alternative means to securely share a secret key between two parties – this technology uses light (e.g. fiber optics) to distribute a secret key and is based on the quantum nature of photons and the ability to detect whether they arrive without having been intercepted.

An Overview of Symmetric Encryption and the Key Lifecycle (2)Block ciphers

Symmetric algorithms fall into two categories – block ciphers and stream ciphers. Block ciphers such as DES and AES operate on a fixed-size block of data, encrypting the whole block (usually 64, 128 or 256 bits) using a cryptographic key (a minimum of 112 bits long to be secure today).

Most block ciphers are based on a “Fiestel network”, named after the IBM cryptographer Horst Fiestel. This design has the advantage that encryption and decryption operations are very similar, even identical in some cases, making it efficient to implement in either hardware or software. To further simplify implementation, Feistel networks use iterations based on an internal function called a “round function”.

A round consists of several processing steps that include substitution, transposition and mixing of the input plaintext to transform it into ciphertext. Algorithms use many rounds to reduce their vulnerability to attack. The substitution aspect is governed by an “S-box”, essentially a look-up table that may be either fixed or generated dynamically from the key. This is an intrinsic part of the algorithm and changing the S-box will fundamentally change its cryptographic characteristics, but a cryptographic expert could potentially modify the S-box to create unique variants of an algorithm.

Stream ciphers

Stream ciphers such as RC4 encrypt the plaintext one bit at a time and require a key in the form of a pseudo-random bit stream (PRBS) – this must be the same for encryption and decryption, hence the need for a secret key to seed the PRBS. Stream ciphers are less commonly used than block ciphers, as the latter offer certain security benefits – specifically, they feature high diffusion (i.e. information from one plaintext symbol is diffused into several ciphertext symbols) and immunity to tampering (i.e. it is difficult to insert symbols into the ciphertext without detection).

The very earliest ciphers, namely simple substitution ciphers, were stream ciphers. The ultimate encryption system is also a type of stream cipher – it uses a “one-time pad”, which is a string of random data that is as long as the plaintext message it is used to encrypt. This is very fast and the only encryption method that is mathematically 100% secure, provided that the one-time pad is truly random and that it is kept secret. For most purposes, it is impractical to generate and use a key that is as long as the plaintext data, not to mention the challenge of sharing it secretly between the sender and recipient.

The lifecycle and management of keys

As can be seen from the foregoing, keys are a critical component of modern cryptography. Without keys, cryptography depends on the algorithm itself being secret, whereas using keys means that the algorithm can be fully known to an attacker, as long as the keys (i.e. symmetric keys or asymmetric private keys) are kept secret. Thus, strong algorithms can be developed and used by everyone.

It is also vitally important that keys are completely random, as any non-randomness reduces the effective strength of the encryption, and that they are “rotated” on a regular basis in keeping with best practice. The generation, protection, rotation, distribution and eventual retirement of keys, collectively known as the “key lifecycle”, must therefore be handled with the utmost care, especially keys used to protect particularly sensitive or valuable data (e.g. personal information, financial transactions, etc.).

Modern key management systems are designed for this purpose, enabling keys to be pro-actively managed throughout their entire life-cycle. Keys are typically generated and protected by special hardware devices called hardware security modules (HSMs) that are independently certified to standards such as FIPS 140-2, Common Criteria or PCI-HSM. Key management systems also maintain secure audit logs to keep track of the keys.

Keys can be securely distributed to wherever they are needed by encrypting them under a pre-shared transport key (aka key encryption key, or KEK); the transport key may be either a symmetric or asymmetric key. Note that such a hierarchical system results in even more keys that must be correctly managed. Alternatively, a secret key can be distributed manually by “splitting” the key, with each key component entrusted to a different individual.


In the next article in this series, we will look at the development of symmetric key algorithms and therange of algorithms available today along with their strengths and weaknesses, as well as the
importance of crypto agility.

An Overview of Symmetric Encryption and the Key Lifecycle (3)

References and Further Reading

  • (2017), byAsim Mehmood
  • Symmetric Key Encryption - why, where and how it’s used in banking(2019), byPeter Smirnoff & Dawn M. Turner
  • Classification of Cryptographic Keys(2018), by Rob Stubbs
  • Cryptographic Key Management - the Risks and Mitigation(2018),by Rob Stubbs
  • Key Management – A Question of Ownership(2018),by Rob Stubbs
  • Selecting the right Key Management System(2019), byDawn M. Turner
  • Strong cryptography and key management requirements for EMV and PCI DSS compliance(2017), byDawn M. Turner

Cover Image: "hallway" by courtesy of Kai Pilger(pexels.com,CC BY 2.0)

An Overview of Symmetric Encryption and the Key Lifecycle (2024)

FAQs

What is the lifecycle of an encryption key? ›

Key Lifecycle Management includes creating, maintaining, protecting, and deleting cryptographic keys. Keys expire or become vulnerable over a period. Their shelf life decreases because of continuous usage and an increased number of authorized users.

What is symmetric encryption simply explained? ›

Symmetric encryption uses one key to encrypt and decrypt. If you encrypt a zip file and then decrypt with the same key, you are using symmetric encryption. Symmetric encryption is also called “secret key” encryption: the key must be kept secret from third parties.

What is symmetric cryptography overview? ›

It is called symmetric because, it makes use of the same key for both encryption of plain text (sending message) and decryption of cipher text (received message). That is, a single key known as secret key is shared between the sender and the receiver.

What is symmetric encryption Quizlet? ›

Symmetric Encryption. - a common encryption method that involves using the same key to encrypt and decrypt the message. - it has other names like: - Shared or Preshared Key. - Secret Key.

What are the 3 types of encryption keys? ›

There are different types of encryption techniques, but the following three are the most common and widely used: Symmetric Encryption, Asymmetric Encryption, and Hashing.

What are the three phases of the cryptographic lifecycle? ›

- Pre-operational: The keying material is not yet available for normal cryptographic operations. Operational: The keying material is available and in normal use. - Post-operational: The keying material is no longer in normal use, but access to the material is possible.

What is an example of a symmetric key encryption? ›

Common Symmetric Encryption Algorithms are widely used in securing data and communications. Examples of these algorithms include Advanced Encryption Standard (AES), Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and Blowfish.

What is the problem with symmetric key encryption? ›

One big issue with using symmetric algorithms is the key exchange problem, which can present a classic catch-22. The other main issue is the problem of trust between two parties that share a secret symmetric key. Problems of trust may be encountered when encryption is used for authentication and integrity checking.

How is a key shared in symmetric encryption? ›

Symmetric-key algorithms require both the sender and the recipient of a message to have the same secret key. All early cryptographic systems required either the sender or the recipient to somehow receive a copy of that secret key over a physically secure channel.

What is the secret key encryption algorithm? ›

Secret-key cryptography is also called symmetric cryptography because the same key is used to both encrypt and decrypt the data. Well-known secret-key cryptographic algorithms include Advanced Encryption Standard (AES), Triple Data Encryption Standard (3DES), and Rivest Cipher 4 (RC4).

What are the two types of symmetric cryptography? ›

There are two types of symmetric algorithms (or ciphers): stream and block. A block cipher divides the data into blocks (often 64-bit blocks, but newer algorithms sometimes use 128-bit blocks) and encrypts the data one block at a time. Stream ciphers encrypt the data as a stream of bits, one bit at a time.

How can you make a symmetric encryption key more difficult to break? ›

To make symmetric encryption keys harder to break, increase the key length, limit its reuse, and utilize an initialization vector.

What is symmetric encryption in cryptography? ›

Symmetric encryption is a type of encryption key management solution where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.

What best describes symmetric encryption? ›

Symmetric encryption uses one key to encrypt and decrypt. If you encrypt a zip file, and then decrypt with the same key, you are using symmetric encryption. Symmetric encryption is also called “Secret key” encryption: the key must be kept secret from third parties.

Which of the following best explains how symmetric encryption? ›

Which of the following best explains how symmetric encryption algorithms are typically used? Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

What is the life cycle of cryptography? ›

The cryptographic lifecycle involves algorithm selection, key management, and the management of encrypted data at rest, in transit, and in storage. Algorithm selection involves a number of choices: The type of cryptology appropriate for the purpose (e.g. symmetric, public key, hashing, etc.)

Do encryption keys expire? ›

The expiration attribute configured for an encryption key identifies the expiration date and time after which the key must not be used anymore for a cryptographic operations.

How long is an encryption key? ›

Advanced Encryption Standard (AES) keys are symmetric keys that can be three different key lengths (128, 192, or 256 bits). AES is the encryption standard that is recognized and recommended by the US government. The 256-bit keys are the longest allowed by AES.

What is the key encryption process? ›

An encryption key is typically a random string of bits generated specifically to scramble and unscramble data. Encryption keys are created using algorithms designed to ensure that each key is unique and unpredictable. The longer the key constructed this way, the harder it is to break the encryption code.

Top Articles
Everything You Need To Know About NSF Fees & Bounced Cheques
Personal Loan for 780 Credit Score
Ron Martin Realty Cam
Dannys U Pull - Self-Service Automotive Recycling
Lamb Funeral Home Obituaries Columbus Ga
Unblocked Games Premium Worlds Hardest Game
Body Rubs Austin Texas
Aiken County government, school officials promote penny tax in North Augusta
Craigslist Nj North Cars By Owner
Weapons Storehouse Nyt Crossword
Kagtwt
Wgu Admissions Login
Fear And Hunger 2 Irrational Obelisk
7543460065
Kylie And Stassie Kissing: A Deep Dive Into Their Friendship And Moments
Jbf Wichita Falls
bode - Bode frequency response of dynamic system
Aldi Bruce B Downs
Toyota Camry Hybrid Long Term Review: A Big Luxury Sedan With Hatchback Efficiency
O'Reilly Auto Parts - Mathis, TX - Nextdoor
Jc Green Obits
Highmark Wholecare Otc Store
LCS Saturday: Both Phillies and Astros one game from World Series
What Time Does Walmart Auto Center Open
The best brunch spots in Berlin
Sister Souljah Net Worth
Geico Car Insurance Review 2024
Xpanas Indo
By.association.only - Watsonville - Book Online - Prices, Reviews, Photos
John Philip Sousa Foundation
Bj's Tires Near Me
Insidious 5 Showtimes Near Cinemark Southland Center And Xd
Dailymotion
Diggy Battlefield Of Gods
Hoofdletters voor God in de NBV21 - Bijbelblog
Mega Millions Lottery - Winning Numbers & Results
Craigslist Ludington Michigan
Appraisalport Com Dashboard /# Orders
Wsbtv Fish And Game Report
Stafford Rotoworld
Mohave County Jobs Craigslist
Craigslist Florida Trucks
Vocabulary Workshop Level B Unit 13 Choosing The Right Word
Luvsquad-Links
Craigslist Malone New York
Sour OG is a chill recreational strain -- just have healthy snacks nearby (cannabis review)
Upcoming Live Online Auctions - Online Hunting Auctions
Shannon Sharpe Pointing Gif
Mytmoclaim Tracking
Westport gun shops close after confusion over governor's 'essential' business list
Wvu Workday
Metra Union Pacific West Schedule
Latest Posts
Article information

Author: Mrs. Angelic Larkin

Last Updated:

Views: 6488

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Mrs. Angelic Larkin

Birthday: 1992-06-28

Address: Apt. 413 8275 Mueller Overpass, South Magnolia, IA 99527-6023

Phone: +6824704719725

Job: District Real-Estate Facilitator

Hobby: Letterboxing, Vacation, Poi, Homebrewing, Mountain biking, Slacklining, Cabaret

Introduction: My name is Mrs. Angelic Larkin, I am a cute, charming, funny, determined, inexpensive, joyous, cheerful person who loves writing and wants to share my knowledge and understanding with you.