Symmetric Encryption (Secret-Key Encryption)
ONE single key is used for both encryption and decryption processes. When encrypting and decrypting data, information, files, transferral, transmission, ensuring integrity, protection and security of access, information and processes are all crucial. Encryption technology, method, code all enable these. Nobody these days want it to be vulnerable, or open to hacking, attack or security breaches. Permission demands, control levels, authorization, authentication can only go that far. Cryptography, algorithms, ciphers are all used to encode/decode and protect access, data and information. Protection against unauthorized access, ability to extract data, use or modify it is becoming increasingly important. It is a cryptography type/class.
Symmetric encryption uses symmetric keys , codes and decoder-keys are involved here. Aligned, the one needs the other one to encode and decode. Both keys are required in order to access, understand and make sense of, use, decipher data, files, systems or information. Without the key it is simply not possible. Secret key, pieces of information are exchanged in order for this process to happen and work. The dynamics and processes of symmetric encryption form the fundamentals for data integrity, protection and safeguarding. Ciphers are used (plaintext to characters) in this process. It is fast and can be used with huge amounts of data. There are various algorithm classes in .NET Framework environment. Four iterations or possibilities, namely: Rijndael, AES, DES and Triple DES and RC2. Symmetric algorithms are used, accessed through base class, share properties like blocksize, feedback-size initialization vectors, keys, key sizes, legal-block-sizes, legal key sizes, mode and padding. There are also different methods and reasons to use these protocols.
Key Exam Points
Master how to generate, encrypt and decrypt using symmetric Encryption, keys , methods and processes.
Asymmetric and symmetric encryption can also be combined in some instances. Learn where to find, how to access and use it effectively.
Review the chapter on user and data security. System.Security.Cryptography namespace review, terms and practice exercises.
Encryption key, cipher text, DES, TDES, AES, Assymetric Encryption.
This article is based on the 2nd edition of the Microsoft .Net Framework Application Training Kit with the purpose to help 70-536 Exam takers to succeed. I constantly look for ways to improve the content. Please leave a comment about this article or drop me a message if you would like to see changes for this site.