Determining which algorithm to use in an encrypted communications session. When encryption is required, and one node signals another to begin a transmission session, there are often several ...
The same secret (private) encryption key used by both sender and receiver. Contrast with asymmetric cipher, which uses a public and private key. See secret key cryptography. THIS DEFINITION IS FOR ...