Due to the increasingly complex nature of data transmission, it has becomes a necessity to use various levels and types of cryptography within the scope of many environments. Onc critical issue that arrises from this is that it is . . .

Due to the increasingly complex nature of data transmission, it has becomes a necessity to use various levels and types of cryptography within the scope of many environments.

Onc critical issue that arrises from this is that it is difficult to compare and contrast various types of cryptographic schema. How does a 1024 bit RSA key stack up against a 1024 bit 3DES key? How does elliptic curve cryptography compare to more common algorithims?

These kind of questions are difficult to answer, but if you manage an environment where security and cryptography are critical components, they are question you just might need to be able to resolve.

The link for this article located at Network Computing is no longer available.