Symmetric Key Encryption - why, where and how it’s used in banking (2024)

In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data that can expose the personally identifiable information (PII) or payment card details of customers and clients. Encryption is essential for protecting PII and mitigating the risks that businesses, which process payment transactions, face every minute of every single day.

This article discusses symmetric encryption in banking, its benefits, and some key management challenges.

What is Symmetric Encryption?

Symmetric encryption is a type of encryption key management solution where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. This encryption method differs from asymmetric encryption where a pair of keys - one public and one private - is used to encrypt and decrypt messages.

By using symmetric encryption algorithms, data is "scrambled" so that it can't be understood by anyone who does not possess the secret key to decrypt it. Once the intended recipient who possesses the key has the message, the algorithm reverses its action so that the message is returned to its original readable form. The secret key that the sender and recipient both use could be a specific password/code or it can be random string of letters or numbers that have been generated by a secure random number generator (RNG). For banking-grade encryption, the symmetric keys must be created using an RNG that is certified according to industry standards, such as FIPS 140-2.

There are two types of symmetric encryption algorithms:

  1. Block algorithms. Set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.

  2. Stream algorithms. Data is encrypted as it streams instead of being retained in the system’s memory.

Some examples of symmetric encryption algorithms include:

AES, DES, IDEA, Blowfish, RC5 and RC6 are block ciphers. RC4 is stream cipher.

DES

In “modern” computing, DES was the first standardized cipher for securing electronic communications, and is used in variations (e.g. 2-key or 3-key 3DES). The original DES is not used anymore as it is considered too “weak”, due to the processing power of modern computers. Even 3DES is not recommended by NIST and PCI DSS 3.2, as well as all 64-bit ciphers. However, 3DES is still widely used in EMV solutions and chip cards because of legacy applications that do not have a crypto-agile infrastructure.

AES

The most commonly used symmetric algorithm is the Advanced Encryption Standard (AES), which was originally known as Rijndael. This is the standard set by the U.S. National Institute of Standards and Technology in 2001 for the encryption of electronic data announced in U.S. FIPS PUB 197. This standard supersedes DES, which had been in use since 1977. Under NIST, the AES cipher has a block size of 128 bits, but can have three different key lengths as shown with AES-128, AES-192 and AES-256.

What is Symmetric Encryption Used For?

While symmetric encryption is an older method of encryption, it is faster and more efficient than asymmetric encryption, which takes a toll on networks due to performance issues with data size and heavy CPU use. Due to the better performance and faster speed of symmetric encryption (compared to asymmetric), symmetric cryptography is typically used for bulk encryption / encrypting large amounts of data, e.g. for database encryption. In the case of a database, the secret key might only be available to the database itself to encrypt or decrypt. Industry-standard symmetric encryption is also less vulnerable to advances in quantum computing compared to the current standards for asymmetric algorithms (at the time of writing).

Some examples of where symmetric cryptography is used are:

  • Payment applications, such as card transactions where PII needs to be protected to prevent identity theft or fraudulent charges

  • Validations to confirm that the sender of a message is who he claims to be

  • Random number generation or hashing

Key management for symmetric encryption - what we need to consider

Unfortunately, symmetric encryption does come with its own drawbacks. Its weakest point is its aspects of key management, including:

Symmetric Key Encryption - why, where and how it’s used in banking (1)

Key Exhaustion

Symmetric Encryption suffers from behavior where every use of a key ‘leaks’ some information that can potentially be used by an attacker to reconstruct the key. The defenses against this behavior include using a key hierarchy to ensure that master or key-encryption keys are not over-used and the appropriate rotation of keys that do encrypt volumes of data. To be tractable, both these solutions require competent key management software and strategies as if (for example) a retired encryption key cannot be recovered the data is potentially lost.

Attribution data

Unlike asymmetric (public-key) Certificates, symmetric keys do not have embedded metadata to record information such as expiry date or an Access Control List to indicate the use the key may be put to - to Encrypt but not Decrypt for example.

The latter issue is somewhat addressed by standards such as ANSI X9-31 where a key can be bound to information prescribing its usage. But for full control over what a key can be used for and when it can be used, an encryption key management solution is required.

Key Management at large scale

Where only a few keys are involved in a scheme (tens to low hundreds), the management overhead is modest and can be handled through manual, human activity. However, with a large estate, tracking the expiration and arranging rotation of keys quickly becomes impractical.

Consider an EMV payment card deployment: millions of cards multiplied by several keys-per-card requires a dedicated provision and encryption key management solution.

Symmetric Key Encryption - why, where and how it’s used in banking (2)

Conclusion

Maintaining large-scale symmetric encryption systems is a very challenging task. This is especially true when we want to achieve banking-grade security and auditability when the corporate and/or IT architecture is decentralized / geographically distributed.

In order to do this properly, it is recommended to use special software to maintain the proper life-cycle for each key created. In instances of massive key enrollment, it is truly impossible to conduct key management manually. We need specialized key management software for it.

Quantum computing is expected to materialize within the next 5-10 years. Already today, NIST advises to replace the widely used 3DES algorithm with algorithms which we consider to be more save, based on today's knowledge.

Not knowing what progress in technology and hence in the evolution malicious decryption-algorithms may be, we strongly advise banks to migrate to a crypto-agile setup. When weaknesses are identified, such a setup will allow for the rapid replacement of algorithms with more secure algorithms. Investment and architectural decisions must be made now in order to avoid major damage in the coming years.

Cryptomathic's key management softwaredelivers a comprehensive crypto-agility security solution that allows organizations to prepare for the post-quantum era with ease.Contact usnow to learn how this cutting-edge technology can help you protect your critical information today.

Symmetric Key Encryption - why, where and how it’s used in banking (3)

References and Further Reading

  • Buyer’s Guide to Choosing a Crypto Key Management System - Part 1: What is a key management system(2018), by Rob Stubbs
  • Buyer's Guide to Choosing a Crypto Key Management System; Part 2: The Requirement for a Key Management System(2018), by Rob Stubbs
  • Buyer’s Guide to Choosing a Crypto Key Management System - Part 3: Choosing the Right Key Management System(2018), by Rob Stubbs

Symmetric Key Encryption - why, where and how it’s used in banking (2024)

FAQs

Why is symmetric encryption used in banking? ›

By encrypting data at rest, organizations can ensure that sensitive data remains protected even if the database is compromised. Symmetric encryption algorithms not only ensure confidentiality but also data integrity, a critical factor in financial transactions.

Where is symmetric key encryption used? ›

Some examples of where symmetric cryptography is used are: Payment applications, such as card transactions where PII needs to be protected to prevent identity theft or fraudulent charges. Validations to confirm that the sender of a message is who he claims to be. Random number generation or hashing.

What is the purpose of encryption in banking security? ›

Encryption Helps Keep Banking Transactions Secure

Encryption is vital for secure online banking in India, safeguarding data and building trust. By using robust standards, Indian banks enhance security, reduce fraud and ensure future advancements in technology.

Why do people use symmetric encryption? ›

Symmetric encryption is often used for high-volume data processing where speed, efficiency, and complexity are important. However, due to its nature as a single-key solution, it presents several security challenges when it comes to actually sharing encrypted data.

What is the best encryption for banking? ›

Use Strong Algorithms: Always opt for well-established encryption algorithms such as AES (Advanced Encryption Standard). AES with a key size of 256 bits is highly recommended for banking applications.

What are the pros and cons of symmetric encryption? ›

The main advantage of symmetric encryption over asymmetric encryption is that it is fast and efficient for large amounts of data; the disadvantage is the need to keep the key secret - this can be especially challenging where encryption and decryption take place in different locations, requiring the key to be moved ...

Is symmetric encryption used for authentication? ›

Note that symmetric encryption is not sufficient for most applications because it only provides secrecy but not authenticity.

What is a real life example of asymmetric encryption? ›

Real-Life Example: WhatsApp

Let's talk about WhatsApp, a popular messaging app used by lots of people. WhatsApp uses asymmetric encryption to keep your messages private and safe.

What type of cryptography will a bank site use? ›

Symmetric-key cryptography is commonly used in electronic banking transactions. When a customer initiates a transaction, the bank encrypts the transaction data using a symmetric key that is shared between the bank and the customer. The customer can then decrypt the data using the same key to verify the transaction.

Where is encryption used and why? ›

Importance of data encryption

Encryption is used for securing devices such as smartphones and personal computers, for protecting financial transactions such as making a bank deposit and buying an item from an online retailer, and for making sure messages such as email and texts are private.

What is an example of a symmetric cipher? ›

Examples of symmetric ciphers are Advanced Encryption Standard (AES), Data Encryption Standard (DES), Blowfish, and International Data Encryption Algorithm (IDEA).

What is bank level encryption? ›

Bank-level security is a form of security that banks or financial institutions use to encrypt and protect financial data and personal information using standard industry tools and technology.

Why do banks use symmetric encryption? ›

For differing use cases, such as banking, symmetric algorithms can provide an advantage in making sure the encryption process is done as fast as possible. How much slower would the world move if internet transactions were several times slower than they are now?

Where would you use symmetric encryption? ›

For this reason, symmetric encryption is the preferred method of encryption in banks, as one key encryption is much swifter than two key encryption. Data Storage: As with banking, data storage services and products tend to use symmetric encryption.

What is the use of symmetric key? ›

In cryptography, a symmetric key is one that is used both to encrypt and decrypt information. This means that to decrypt information, one must have the same key that was used to encrypt it.

What is the RSA algorithm in banking? ›

RSA is an asymmetric cryptographic algorithm which means that there are a pair of keys that are public and private keys. Two Fish Algorithm uses a block cipher in which it uses a key length of256 bits and is said to be efficient even when it is used in companies having a small processor.

Why asymmetric encryption is more suited to transactions over the Internet than symmetric encryption? ›

Asymmetric cryptography offers better security because it uses two different keys — a public key which only gets used to encrypt messages, making it safe for anyone to have, and a private key to decrypt messages that never needs to be shared.

Why do companies use asymmetric encryption? ›

Asymmetric cryptography techniques allow for extremely secure communication between two parties. Chances are, you've encountered this technology before, even if you never knew what it was called. For example, each time you visit a website with an address starting with "https," you're dealing with asymmetric encryption.

What is the primary advantage of asymmetric encryption over symmetric encryption? ›

Increased data security is the primary benefit of asymmetric cryptography. It is the most secure encryption process because users are never required to reveal or share their private keys, decreasing the chances of a cybercriminal discovering a user's private key during transmission.

Top Articles
Motor Vehicle Tax Guide
ETFs for the Driverless Car Revolution
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Zonia Mosciski DO

Last Updated:

Views: 5882

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Zonia Mosciski DO

Birthday: 1996-05-16

Address: Suite 228 919 Deana Ford, Lake Meridithberg, NE 60017-4257

Phone: +2613987384138

Job: Chief Retail Officer

Hobby: Tai chi, Dowsing, Poi, Letterboxing, Watching movies, Video gaming, Singing

Introduction: My name is Zonia Mosciski DO, I am a enchanting, joyous, lovely, successful, hilarious, tender, outstanding person who loves writing and wants to share my knowledge and understanding with you.