Symmetric Cryptography
Symmetric cryptography has one key. This key is used to encrypt and decrypt the data.
Symmetric encryption is suitable for storage. If a key is shared unencrypted with the ciphertext protected by it, the encryption can always be compromised by the connection bearer. Therefore, symmetric cryptography cannot be used to initialize a secure connection. Asymmetric cryptography is used for that purpose.
Typical workflow
- Alice and Bob knows the key.
 - Alice has the plaintext.
 - Alice encrypts the plaintext with the key.
 - Alice sends the ciphertext to Bob.
 - Bob decrypts the ciphertext with the key.
 - Bob has the plaintext.