Técnica
criptográfica donde se usa la misma clave secreta para cifrar y para descifrar.
Sin el conocimiento de la clave es [computacionalmente] imposible tanto cifrar
como descifrar.
cryptographic technique that
uses the same secret key for both the encryption and the decryption
transformations [ISO-19790:2006]
cryptographic technique that
uses the same secret key for both the originators and the recipients
transformation. Without knowledge of the secret key, it is computationally
infeasible to compute either the originators or the recipients transformation.
NOTE. Examples of symmetric
cryptographic techniques include symmetric ciphers and Message Authentication
Codes (MACs). In a symmetric cipher, the same secret key is used to encrypt and
decrypt data. In a MAC scheme, the same secret key is used to generate and
verify MACs.
[ISO-18033-1:2005]
A cryptographic technique
that uses the same secret key for both the originator's and the recipient's
transformation.
NOTE. Without knowledge of
the secret key, it is computationally infeasible to compute either the
originator's or the recipient's transformation.
[ISO-9798-1:1997]
A cryptographic technique
that uses the same secret key for both the originators and the recipients
transformation. Without knowledge of the secret key, it is computationally
infeasible to compute either the originators or the recipients transformation. [ISO-11770-1:1996]
Technique
cryptographique qui utilise la même clé secrète pour la transformation
cryptographique de l'émetteur ou du destinataire. Sans connaissance de la clé
secrète, il est impossible de calculer la transformation cryptographique de
l'émetteur ou du destinataire. [ISO-11770-1:1996]