ABSTRACT

As shown in Figure 2.1, symmetric-key cryptosystems require that

the two parties attempting to communicate share the same key.

This key is used for both encryption and decryption because the

two operations are symmetric, i.e. almost identical, hence why

such cryptosystems are known as symmetric-key cryptosystems.

Such cryptosystems are analogous to securing a cabinet with a

combination lock; anyone with the combination can either deposit

or withdraw information from the cabinet.