Combining Various Strengths of Cryptography
Source: Network Computing - Posted by LinuxSecurity.com Team   
Cryptography Due to the increasingly complex nature of data transmission, it has becomes a necessity to use various levels and types of cryptography within the scope of many environments. Onc critical issue that arrises from this is that it is . . . Due to the increasingly complex nature of data transmission, it has becomes a necessity to use various levels and types of cryptography within the scope of many environments.

Onc critical issue that arrises from this is that it is difficult to compare and contrast various types of cryptographic schema. How does a 1024 bit RSA key stack up against a 1024 bit 3DES key? How does elliptic curve cryptography compare to more common algorithims?

These kind of questions are difficult to answer, but if you manage an environment where security and cryptography are critical components, they are question you just might need to be able to resolve.

Read this full article at Network Computing

Only registered users can write comments.
Please login or register.

Powered by AkoComment!