Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)ISSO D Discussion Lesson 07

Kevin Mehok

IST3100 Information Systems Security Officer
Week Two Lesson 7
Kevin Mehok

Hey Class,

Symmetric Encryption is the most basic and old method of encryption (Hera, 2021). It uses only one key for the process of both the encryption and decryption of data (Hera, 2021). Thus, it is also known as Single-Key Encryption (Hera, 2021).

A few basic terms in Cryptography are as follows:

Plain Text: original message to be communicated between sender and receiver (Hera, 2021).

Cipher Text: encoded format of the original message that cannot be understood by humans.
Encryption (or Enciphering): the conversion of plain text to cipher text (Hera, 2021).

Decryption (or Deciphering): the conversion of cipher text to plain text, i.e., reverse of encryption (Hera, 2021).

The Symmetric Cipher Model:
A symmetric cipher model is composed of five essential parts:
1. Plain Text (x): This is the original data/message that is to be communicated to the receiver by the sender (Hera, 2021). It is one of the inputs to the encryption algorithm (Hera, 2021).

2. Secret Key (k): It is a value/string/textfile used by the encryption and decryption algorithm to encode and decode the plain text to cipher text and vice-versa respectively (Hera, 2021). It is independent of the encryption algorithm. It governs all the conversions in plain text (Hera, 2021). All the substitutions and transformations done depend on the secret key (Hera, 2021).

3. Encryption Algorithm (E): It takes the plain text and the secret key as inputs and produces Cipher Text as output (Hera, 2021). It implies several techniques such as substitutions and transformations on the plain text using the secret key (Hera, 2021).

E(x, k) = y

4. Cipher Text (y): It is the formatted form of the plain text (x) which is unreadable for humans, hence providing encryption during the transmission (Hera, 2021). It is completely dependent upon the secret key provided to the encryption algorithm (Hera, 2021). Each unique secret key produces a unique cipher text (Hera, 2021).

5. Decryption Algorithm (D): It performs reversal of the encryption algorithm at the recipient’s side (Hera, 2021). It also takes the secret key as input and decodes the cipher text received from the sender based on the secret key. It produces plain text as output (Hera, 2021).

D(y, k) = x


Hera, A (2021)


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .