Ver:
· Cifrado
· Criptografía de clave secreta
· Algoritmo criptográfico simétrico
Técnica
criptográfica donde se usa la misma clave secreta para cifrar y para descifrar.
Sin el conocimiento de la clave es [computacionalmente] imposible tanto cifrar
como descifrar.
cryptographic
technique that uses the same secret key for both the encryption and the
decryption transformations [ISO-19790:2006]
cryptographic
technique that uses the same secret key for both the originators and the
recipients transformation. Without knowledge of the secret key, it is
computationally infeasible to compute either the originators or the recipients
transformation.
NOTE. Examples of
symmetric cryptographic techniques include symmetric ciphers and Message
Authentication Codes (MACs). In a symmetric cipher, the same secret key is used
to encrypt and decrypt data. In a MAC scheme, the same secret key is used to
generate and verify MACs.
[ISO-18033-1:2005]
A cryptographic
technique that uses the same secret key for both the originator's and the
recipient's transformation.
NOTE. Without
knowledge of the secret key, it is computationally infeasible to compute either
the originator's or the recipient's transformation.
[ISO-9798-1:1997]
A cryptographic
technique that uses the same secret key for both the originators and the
recipients transformation. Without knowledge of the secret key, it is
computationally infeasible to compute either the originators or the recipients
transformation. [ISO-11770-1:1996]
Technique
cryptographique qui utilise la même clé secrète pour la transformation
cryptographique de l'émetteur ou du destinataire. Sans connaissance de la clé
secrète, il est impossible de calculer la transformation cryptographique de
l'émetteur ou du destinataire. [ISO-11770-1:1996]
Temas relacionados