Questions tagged [symmetric-key]

algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys.

as stated in Wikipedia.

Since this tag is used in its general meaning, it would be a good idea to use one or more tags too, to describe your specific case better.

83 questions
27
votes
1 answer

Why is AES more secure than DES?

I am beginning to learn crypto algorithms and I understand how the above mentioned algorithms work. Is it that the key length of AES is longer? Which steps of AES encryption makes it less vulnerable than DES?
unj2
  • 52,135
  • 87
  • 247
  • 375
23
votes
9 answers

Symmetric key storage

My company is going to be storing sensitive data for our customers, and will be encrypting data using one of the managed .NET encryption algorithm classes. Most of the work is done, but we haven't figured out how/where to store the key. I've done…
Daniel Schaffer
  • 56,753
  • 31
  • 116
  • 165
18
votes
1 answer

Why Primary key and Secondary key in Azure IoT hub?

When creating a shared access policy or registering a device in Azure IoT hub, there will be a Primary key and Secondary key pair generated. And I noticed I can connect a device to IoT hub using either Primary key or Secondary key. So, what's the…
Shuping
  • 5,388
  • 6
  • 43
  • 66
9
votes
1 answer

Xcode 11 Swift 5 CryptoKit share SymmetricKey

I'm starting to learn de-/encrypting with the CryptoKit. Everything works fine, but I can not share my generated SymmetricKey. Example: let key = SymmetricKey(size: .bits256) Well, I generate a symmetric key. Now I want to share the key, but how…
P. S.
  • 93
  • 1
  • 6
6
votes
2 answers

How to backup Symmetric Key in SQL Server?

I use the next code to create SQL Encryption keys CREATE MASTER KEY ENCRYPTION BY PASSWORD = '' CREATE CERTIFICATE MyEncryptCert WITH SUBJECT = 'Descryption', EXPIRY_DATE = '2115-1-1' CREATE SYMMETRIC KEY MySymmetricKey WITH ALGORITHM =…
Alexander T
  • 61
  • 1
  • 1
  • 5
6
votes
2 answers

Rijndael key size in C#

I'm currently developing a little tool in C# that allows me to quickly crypt my files. So I used this script which looks to be perfect for me. But I still have a problem : the key is too short (8 character max). I read in RijndaelManaged()…
user6248151
5
votes
0 answers

Open chachapoly sealed box after removing and recreating a symmetric key (iOS)?

I am in a bit of a roadblock on my iOS app (first app for me), I want to encrypt data that I send to a server. In order to do so I generate a symmetric key that I store in the keychain. The key is generated in the following way: SymmetricKey(data:…
Sir Sirae
  • 51
  • 2
5
votes
1 answer

How can I duplicate a SQL Server symmetric key?

We have a server with a database that has a symmetric key (Database -> Security -> Symmetric Key). We have a backup duplicate databases that we are using as a test databases, but we don't have this key in there. How can I duplicate this symmetric…
rlb.usa
  • 14,942
  • 16
  • 80
  • 128
4
votes
2 answers

Can we use the key as the IV for AES?

I wish to be more efficient in generating a random key and a random IV for the encryption. But is it workable and safe to use the random key as the IV?
Chong Lip Phang
  • 8,755
  • 5
  • 65
  • 100
4
votes
2 answers

how to 'Zero out' from memory an AES SecretKeySpec Key in Java

I am using Java AES encryption using SecretKeySpec(byte[] key, String algorithm) to generate a Key object. After I encrypt something, I want to remove the Key from memory. I can remove all references to the Key, but that does not guarantee that…
adamM
  • 1,116
  • 10
  • 29
4
votes
3 answers

How to check who has access to symmetric keys in SQL Server

I would like to know all the users that have access to symmetric keys and the type of access they have. Can you please let me know how I can do this?
user3229801
  • 63
  • 1
  • 1
  • 4
4
votes
4 answers

SQL Server 2005 - Restoring an encrypted DB on a different server

I have backed up an encrypted DB (symmetric key/certificate) and restored it on a different server. Unfortuantely we're having problems with the decryption... hoping someone can help. In the restored db, I can see the Symmetric Key and the…
user24531
  • 226
  • 2
  • 5
3
votes
0 answers

Is it possible to encrypt a message outside of AWS KMS using a "key material" and decrypt using KMS?

I have created a custom managed symmetric key (for encryption / decryption purposes) in AWS KMS and imported my own key material from an external source. For symmetric keys, AWS KMS uses the AES-256-GCM algorithm spec. What I am trying to understand…
3
votes
2 answers

Cannot find the symmetric key in SQL Server 2008

I have a permissions issue with regard to using a symmetric key under a specific user name when a stored procedure is executed. Despite running GRANT CONTROL ON CERTIFICATE::myCert TO myUser GRANT VIEW DEFINITION ON SYMMETRIC KEY::myKey TO myUser I…
ComfortablyNumb
  • 1,448
  • 10
  • 37
  • 64
3
votes
2 answers

Why in brute force attack on Symmetric Algorithm there is 50 percent chance of finding the key after half of the attempts?

Any cryptography text mentions that in brute force attack on Symmetric Algorithm there is 50 percent chance of finding the key after half of the attempt. e.g. DES with 56 bit key would have 50% chance of finding the key after the first 255…
Anand Patel
  • 6,031
  • 11
  • 48
  • 67
1
2 3 4 5 6