11. – 16. Januar 2009, Dagstuhl-Seminar 09031

Symmetric Cryptography


Helena Handschuh (San Francisco, US)
Stefan Lucks (Bauhaus-Universität Weimar, DE)
Bart Preneel (KU Leuven, BE)
Phillip Rogaway (University of California – Davis, US)

Auskunft zu diesem Dagstuhl-Seminar erteilt

Dagstuhl Service Team


Dagstuhl Seminar Proceedings DROPS
Dagstuhl's Impact: Dokumente verfügbar


Cryptography is the science that studies secure communication in adversarial environments. Symmetric Cryptography deals with two cases:

  • either sender and receiver share the same secret key, as for encryption and message authentication;
  • or neither sender nor receiver use any key at all, as, e.g., in the case of cryptographic hash functions.

Specifically, Symmetric Cryptography deals with symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and complex cryptosystems and cryptographic protocols employing these primitives.

Since symmetric cryptosystems are one to two orders of magnitude more efficient than asymmetric systems, most security applications use symmetric cryptography to ensure the privacy, the authenticity and the integrity of sensitive data. Even most applications of public-key cryptography are actually working in a hybrid way, separating an asymmetric protocol layer for key transmission or key agreement from secure payload transmission by symmetric techniques.

  • studying the design and analysis of stream ciphers
  • presenting and attacking recent proposals for cryptographic hash functions; and
  • advancing the field of complex symmetric cryptosystems and protocols and their provable security.

Research in Symmetric Cryptography is quickly evolving. The seminar was the second of its kind, the first one took place in 2007. We observe a steadily increasing interest in Symmetric Cryptography, as well as a growing practical demand for symmetric algorithms and protocols.

The seminar was very successful in discussing recent results and sharing new ideas. Furthermore, it inspired the participants to consider how Symmetric Cryptography has evolved in the past, and how they would like it to evolve in the future. The hospitality and support of the Dagstuhl team did contribute significantly to the success of the seminar.

Dagstuhl-Seminar Series


  • Security
  • Cryptography


  • Authenticity
  • Integrity
  • Privacy
  • Stream Ciphers
  • Hash Functions
  • Provable Security
  • Cryptanalysis


Bücher der Teilnehmer 

Buchausstellung im Erdgeschoss der Bibliothek

(nur in der Veranstaltungswoche).


In der Reihe Dagstuhl Reports werden alle Dagstuhl-Seminare und Dagstuhl-Perspektiven-Workshops dokumentiert. Die Organisatoren stellen zusammen mit dem Collector des Seminars einen Bericht zusammen, der die Beiträge der Autoren zusammenfasst und um eine Zusammenfassung ergänzt.


Download Übersichtsflyer (PDF).


Es besteht weiterhin die Möglichkeit, eine umfassende Kollektion begutachteter Arbeiten in der Reihe Dagstuhl Follow-Ups zu publizieren.

Dagstuhl's Impact

Bitte informieren Sie uns, wenn eine Veröffentlichung ausgehend von
Ihrem Seminar entsteht. Derartige Veröffentlichungen werden von uns in der Rubrik Dagstuhl's Impact separat aufgelistet  und im Erdgeschoss der Bibliothek präsentiert.