Users need to exchange a shared secret to begin communicating securely. Which of the following is another
name for this symmetric key?
Symmetric algorithms require both ends of an encrypted message to have the same key and processing
algorithms. Symmetric algorithms generate a secret key that must be protected. A symmetric key, sometimes
referred to as a secret key or private key, is a key that isn’t disclosed to people who aren’t authorized to use the