About 56,400 results
Open links in new tab
  1. Is there a correct way to generate a symmetric key?

    A Key Derivation Function (KDF) is a function that transforms some input into a key. GPG uses a Password-Based KDF (PBKDF, also known as a "password hash") to transform a password …

  2. key exchange - Number of keys when using symmetric and …

    Symmetric key encryption algorithm is used? For symmetric, you need $ {n \choose 2} = \frac {n \cdot (n-1)} {2}$ keys: Each pair of parties would need a single key that will be used to both …

  3. symmetric - Is AES-128 quantum safe? - Cryptography Stack …

    Nov 10, 2022 · In summary, our most important symmetric cryptographic tools (AES, SNOW 3G, SHA2, SHA3 and so on) remain secure against quantum computers as they are. This also …

  4. Is Diffie-Hellman Key Exchange an Asymmetric or Symmetric …

    Nov 7, 2021 · The Diffie-Hellman key exchange is an asymmetric algorithm that is used to establish a symmetric key. In general asymmetric cryptography is when the communicators …

  5. How is the key shared in symmetric key cryptography?

    Symmetric key cryptography is an encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. Is the …

  6. Why use symmetric encryption with Public Key?

    Nov 15, 2019 · Symmetric-key cryptography is much easier than public-key cryptography. Providing a way to scramble a message using a public key so that it can be unscrambled only …

  7. Does symmetric key cryptography usually include hash function?

    Jan 11, 2023 · I know that symmetric key algorithms use the same key to encrypt and decrypt plaintext and ciphertext. However, it seems that hash functions are often classified as …

  8. key derivation - Deriving Keys for Symmetric Encryption and ...

    If your key has 256 bits of entropy and your key derivation function is one-way, adding or removing iterations to key derivation won't make bruteforcing particularly harder or easier -- 1 …

  9. public key - Why does the recommended key size between …

    In various articles it is mentioned that for secure communications, the recommended key sizes are 128-bit key size for symmetric encryption (which makes it $2^ {128}$ possible keys?) and …

  10. Can Quantum Computers crack RSA and AES?

    Mar 6, 2023 · Independent of quantum computing considerations, what you see is encrypted AES traffic if and when you decrypt the asymmetric encryption, as well as getting the keys for the …