E and D are parameterized with a key K.
In symmetric cipher Alice and Bob share the same key (the encryption and decryption keys are the same).
Kerckhoffs's principle = “one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them” —basically everything can and should be public except the key.
Some well known symmetric ciphers:
Encryption and decryption keys are different.
Typical use cases:
Some well-known asymmetric ciphers:
We want:
Use-cases
We want something unpredictable and uninfluenceable.
hybrid ciphers, challenge-response authentication.
Xors key and the plaintext.
Another similar structure is
Perfectly secure. Key must not be repeated ever.
An attacker can easily change messages.
The probability that ciphertext decrypts to a given plaintext is the same for all plaintexts.
When the number of keys is smaller than the number of messages it must hold that for some 2 messages.