Applications of symmetric encryption
Categories: cryptography
The main use of symmetric encryption is to encrypt data so that only those who know the key can access the data. There are other, less well known uses too.
Exchanging Secret Information
The most obvious application for symmetric encryption is transferring secret information between 2 people (or 2 computers) over an insecure channel - for instance by email, or on removable media.
The simple solution is for person A to encrypt the data with a secret key before it is sent. When person B receives the data, he can decrypt it using the same key to recover the original plaintext. If anyone else intercepts the ciphertext, it will be useless to them. The message remains secret, no matter who sees the ciphertext. The main problem here is that A and B need to have previously agreed on a secret key, and they both need to keep it secret. As we will see later there are better ways of doing this with public key encryption.
Another example is a "wallet" application. It is very useful to be able to store information on your laptop or mobile phone so you always have it to hand - membership numbers, insurance policy numbers, credit card details, PIN’s, passwords. Of course it would be a disaster if your device was stolen and this information fell into the wrong hands. A "wallet" gets around this by encrypting the data before storing it. Each time you open the application you type in a password, which is used to encrypt and decrypt the data.
The thing to remember about strong encryption is that the key is all important. Nobody can access your credit card details without the key, not even the person who wrote the wallet program (unless they have written a "backdoor" into the program).
As a final example, suppose you have written computer game, and you want to store each player’s current level in a data file. You don’t want players to be able to cheat by editing the data file, so you decide to encrypt it. The program has a fixed key built in, which it uses to encrypt and decrypt the data.
This final example is not secure. The key is built in to the program, and a smart hacker with the right tools could quite easily pick your program apart and find the key. However in this particular case it is probably not too much of a problem, because the data isn’t very important.
Validating Information
There is a second aspect of encryption which can be useful. When B receives an encrypted message, assuming it decrypts to produce a sensible message, he can be pretty sure it was sent by A because nobody else would be capable of generating an encrypted message.
You need to be very careful with this assumption, because not all algorithms are totally secure in this way. There may be ways that an attacker can make changes to a message without knowledge of the key. For example, he might have recorded encrypted data from a previous message which can then be injected into a new encrypted message giving a result which might appear sensible. Using [[data formats:cryptography:Cryptographic modes|CBC mode]] helps guard against this attack. In general it is better to use a [[data formats:cryptography:Cryptographic hash|hash]], a [[data formats:cryptography:Message Authentication Code]] or some kind of digital signature to validate the data.
Hashing
Due to the highly complex relationship between the plaintext, the key and the ciphertext, it is possible to use an encryption algorithm as the basis of a [[data formats:cryptography:Cryptographic hash]] or [[data formats:cryptography:Message Authentication Code]].
Random Number Generation
For similar reasons to the hash case, encryption algorithms can be used as the basis of pseudo-random number generators. The general idea is that, whatever you feed into the encryption algorithm, the output will tend to have strongly random characteristics.
See also
- Symmetric encryption
- Symmetric block ciphers
- Symmetric encryption algorithms
- Cryptographic modes
- Block padding methods
- Attacks on symmetric ciphers
- Cryptographic hashes
- Strong hashing functions
- Applications of hashes
- Common hash algorithms
- Attacks on hash algorithms
- Iterative hashes
- Message authentication codes
- Common MAC algorithms
- HMAC algorithm
- Key derivation
- Dictionary attacks on keys
- Key derivation using hash functions
- Salting
- Key derivation using random number generators
- Key derivation standards
Sign up to the Creative Coding Newletter
Join my newsletter to receive occasional emails when new content is added, using the form below:
Popular tags
555 timer abstract data type abstraction addition algorithm and gate array ascii ascii85 base32 base64 battery binary binary encoding binary search bit block cipher block padding byte canvas colour coming soon computer music condition cryptographic attacks cryptography decomposition decryption deduplication dictionary attack encryption file server flash memory hard drive hashing hexadecimal hmac html image insertion sort ip address key derivation lamp linear search list mac mac address mesh network message authentication code music nand gate network storage none nor gate not gate op-amp or gate pixel private key python quantisation queue raid ram relational operator resources rgb rom search sort sound synthesis ssd star network supercollider svg switch symmetric encryption truth table turtle graphics yenc