Symmetric key cryptography
This article may be deleted soon.  

Symmetric key cryptography uses the same key for both encryption and decryption. Since compromise of a single key completely defeats the security of symmetric key techniques, it is also called secret key cryptography. "Secret key" is slightly misleading, as the private key in asymmetric key cryptography also must be protected. The first symmetric ciphers were monoalphabetic, operating on individual letters. They included substitutions such as the Caesar cipher, as well as simple transposition cipher. All used symmetric keying, as, indeed, did every known system until the advent of asymmetric key (public key) methods in the mid1970s. The next level of complexity moved to polyalphabetic substitution, still one character at a time. The study of symmetrickey ciphers involves the study of block ciphers and stream ciphers and their applications. Block ciphersA block cipher is the modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of plaintext and a key, and output a block of ciphertext of the same size. Block ciphers are used in a mode of operation to implement a cryptosystem. DES and AES are block ciphers which have been designated cryptography standards by the US government (though DES's designation was eventually withdrawn after the AES was adopted)^{[1]}. Despite its delisting as an official standard, DES (especially its stillapproved and much more secure Triple DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption^{[2]} to email privacy^{[3]} and secure remote access^{[4]}. Many other block ciphers have been designed and released, with considerable variation in quality. ^{[5]} Stream ciphersStream ciphers, in contrast to the 'block' type, create an arbitrarily long stream of key material, which is combined with the plaintext bit by bit or character by character, somewhat like the onetime pad. In a stream cipher, the output stream is created based on an internal state which changes as the cipher operates. That state's change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a wellknown stream cipher ^{[5]} Hybrid cryptosystemsIn general, symmetric ciphers are much faster than asymmetric ones, but key management for symmetric ciphers can be difficult. For people to communicate, keys are needed and all of them must be securely communicated before they can be used. This problem is often managed by using a hybrid cryptosystem in which public key techniques handle key management and symmetric ciphers do the encryption of actual messages. References
