Welcome to YLOAN.COM
yloan.com » Sales-Training » CCNA training - Symmetric Encryption Algorithms
Marketing Advertising Branding Careers-Employment Change-Management Customer Service Entrepreneurialism Ethics Marketing-Direct Negotiation Outsourcing PR Presentation Resumes-Cover-Letters Sales Sales-Management Sales-Teleselling Sales-Training Strategic-Planning Team-Building Top7-or-Top10-Tips Workplace-Communication aarkstore corporate advantages development collection global purchasing rapidshare grinding wildfire shipping trading economy wholesale agency florida attorney strategy county consumer bills niche elliptical

CCNA training - Symmetric Encryption Algorithms

CCNA training - Symmetric Encryption Algorithms


Symmetric encryption algorithms get their name from the fact that they use the exact same key from the encryption and decryption process. For this process to work both the sender and the receiver must have the same shared secret key to be able to perform the encryption and decryption of the data they are transmitting.

Symmetric encryption is also commonly referred to as secret key encryption, because for the communication between sender and receiver to remain secure it is important that the shared key remain secure, as you can imagine if anyone got hold of the key they would be able to encrypt and decrypt messages.

There are quite a few well known symmetric encryption algorithms, some are more common than others, the more popular methods are those which employ bigger key sizes, also their are three main types of symmetric encryption methods

Block ciphers

Message Authentication Codes (MAC)

Stream Ciphers

Symmetric methods compared asymmetric encryption methods are very fast and use up less resources on your devices and for these reasons they are used more often for bulk encryption when you need to ensure complete privacy.

The main drawback to this method of encryption is the initial and continual safe distribution of keys between your devices without the keys becoming compromised.

Nowadays a new method of key distribution is used where an asymmetric channel between two systems is created to build a secure tunnel over which your shared key will be exchanged before any important user data is transferred.

Thank you, Please rate our article
Potty Training Girls-a Necessary Training Forex Illusion – Watch This Free Forex Training Video 650-195 Training Tools Uhoh - Judgement Recovery Training If You Are Looking For Wealthy Affiliate Training, Look No Further! Clicker Training 4 Secrets to Becoming a Supertrainer Review Great Training Skills Gained Through Watching Videos CCNA Training - Neighbor Discovery for Layer 2 Discovery Turbo Fire High Intensity Interval Training (HIIT) With Chalene Johnson Workout Review The 3 Training Aspects You Need To Focus On For MMA Key Workout Training Tips Personal Training In London Can Take Stress Out Of Your Life! Kettlebell Training Workouts - Simple Kettlebell Workouts
print
www.yloan.com guest:  register | login | search IP(216.73.216.125) California / Anaheim Processed in 0.024649 second(s), 5 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 20 , 1716, 145,
CCNA training - Symmetric Encryption Algorithms Anaheim