Professional Documents
Culture Documents
In this lesson we will learn about different symmetric key algorithms and their key features. More importantly, we will learn about some more key concepts related to cryptography as it applies to both symmetricandasymmetricalgorithms . Finally, we will learn the advantages and disadvantages of symmetric and asymmetric algorithms. First, lets learn a bit about the differences between block and stream ciphers.
A cryptovariable, or key, is the valueappliedto encryptedor clear text in orderto decryptor encrypt the text. The length of the key, in bits, is usually a good indicator of the strength of the key. A 128-bit key is, for example, much stronger than a 32-bit key.
(From Navy) Symmetric Key Encryption Schema Symmetric key protocols are known to be faster and stronger than their asymmetric counterparts but do possess unique disadvantages that we will discuss later. We will now look at some common symmetric algorithms.
time it would take to crack the key. In addition, 3DES is very slow by todays standards and would not be practical to use in encrypting large files.