what are the requirements of symmetric key cryptography