Skip to content

Symmetric Cryptography

Symmetric cryptography has one key. This key is used to encrypt and decrypt the data.

Symmetric encryption is suitable for storage. If a key is shared unencrypted with the ciphertext protected by it, the encryption can always be compromised by the connection bearer. Therefore, symmetric cryptography cannot be used to initialize a secure connection. Asymmetric cryptography is used for that purpose.

Typical workflow

  • Alice and Bob knows the key.
  • Alice has the plaintext.
  • Alice encrypts the plaintext with the key.
  • Alice sends the ciphertext to Bob.
  • Bob decrypts the ciphertext with the key.
  • Bob has the plaintext.