Welcome to YLOAN.COM
yloan.com » Sales-Training » Ccna Training - Symmetric Encryption Algorithms
Marketing Advertising Branding Careers-Employment Change-Management Customer Service Entrepreneurialism Ethics Marketing-Direct Negotiation Outsourcing PR Presentation Resumes-Cover-Letters Sales Sales-Management Sales-Teleselling Sales-Training Strategic-Planning Team-Building Top7-or-Top10-Tips Workplace-Communication aarkstore corporate advantages development collection global purchasing rapidshare grinding wildfire shipping trading economy wholesale agency florida attorney strategy county consumer bills niche elliptical

Ccna Training - Symmetric Encryption Algorithms

CCNA training - Symmetric Encryption Algorithms


Symmetric encryption algorithms get their name from the fact that they use the exact same key from the encryption and decryption process. For this process to work both the sender and the receiver must have the same shared secret key to be able to perform the encryption and decryption of the data they are transmitting.

Symmetric encryption is also commonly referred to as secret key encryption, because for the communication between sender and receiver to remain secure it is important that the shared key remain secure, as you can imagine if anyone got hold of the key they would be able to encrypt and decrypt messages.

There are quite a few well known symmetric encryption algorithms, some are more common than others, the more popular methods are those which employ bigger key sizes, also their are three main types of symmetric encryption methods


Block ciphers

Message Authentication Codes (MAC)

Stream Ciphers

The main difference between block and stream ciphers are based on how the encryption mechanisms generate the encrypted text from the plain input text. Block ciphers take fixed length blocks of plain text and convert them into fixed length ciphers texts, stream ciphers work generally on the bit level.

Symmetric methods compared asymmetric encryption methods are very fast and use up less resources on your devices and for these reasons they are used more often for bulk encryption when you need to ensure complete privacy.

The main drawback to this method of encryption is the initial and continual safe distribution of keys between your devices without the keys becoming compromised.

Nowadays a new method of key distribution is used where an asymmetric channel between two systems is created to build a secure tunnel over which your shared key will be exchanged before any important user data is transferred.

Thank you, Please rate our article

by: Joe Spoto
Ccna Training -the Spanning-tree Root Bridge Ccna/ccnp Training- Ospf Hello Packet The Necessity of CNA Training The Importance of CNA Skills Training In the Life of a Nurse Some Mlm Training Tips Give Your Career Some Impetus With Ccna Training Course Gmp Training Steps Training Pension and Benefits Managers at Centennial College Setting Up A Training Program Foreign Currency Training Program Benefiting From The Inspiration Discovered With Melbourne Personal Training Ccna Ccnp Training Offset Lists Surgical Technologist Training
print
www.yloan.com guest:  register | login | search IP(216.73.216.181) California / Anaheim Processed in 0.017025 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 24 , 2046, 145,
Ccna Training - Symmetric Encryption Algorithms Anaheim