Statements (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
crypt
|
gptkbp:advantage |
faster than asymmetric-key algorithms
key management complexity scalability issues in large networks |
gptkbp:alsoKnownAs |
secret-key algorithm
|
gptkbp:category |
crypt
|
gptkbp:contrastsWith |
asymmetric-key algorithm
|
gptkbp:example |
gptkb:IDEA
gptkb:DES gptkb:Triple_DES gptkb:Twofish gptkb:RC4 gptkb:AES gptkb:Blowfish |
https://www.w3.org/2000/01/rdf-schema#label |
Symmetric-key algorithm
|
gptkbp:requires |
secure key distribution
|
gptkbp:standardizedBy |
gptkb:NIST
|
gptkbp:usedFor |
encryption
decryption |
gptkbp:usedIn |
gptkb:IPsec
gptkb:SSL TLS authentication data integrity file encryption data confidentiality disk encryption |
gptkbp:uses |
same key for encryption and decryption
|
gptkbp:vulnerableTo |
key compromise
|
gptkbp:bfsParent |
gptkb:Substitution-permutation_network
gptkb:Cipher-based_Message_Authentication_Code |
gptkbp:bfsLayer |
7
|