Statements (31)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:crypt
|
| gptkbp:advantage |
faster than asymmetric-key algorithms
key management complexity scalability issues in large networks |
| gptkbp:alsoKnownAs |
secret-key algorithm
|
| gptkbp:category |
gptkb:crypt
|
| gptkbp:contrastsWith |
asymmetric-key algorithm
|
| gptkbp:example |
gptkb:IDEA
gptkb:DES gptkb:Triple_DES gptkb:Twofish gptkb:RC4 gptkb:AES gptkb:Blowfish |
| gptkbp:requires |
secure key distribution
|
| gptkbp:standardizedBy |
gptkb:NIST
|
| gptkbp:usedFor |
encryption
decryption |
| gptkbp:usedIn |
gptkb:IPsec
gptkb:SSL TLS authentication data integrity file encryption data confidentiality disk encryption |
| gptkbp:uses |
same key for encryption and decryption
|
| gptkbp:vulnerableTo |
key compromise
|
| gptkbp:bfsParent |
gptkb:Cipher-based_Message_Authentication_Code
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Symmetric-key algorithm
|