Combining Various Strengths of Cryptography

    Date03 Feb 2000
    CategoryCryptography
    6980
    Posted ByAnthony Pell
    Due to the increasingly complex nature of data transmission, it has becomes a necessity to use various levels and types of cryptography within the scope of many environments. Onc critical issue that arrises from this is that it is . . . Due to the increasingly complex nature of data transmission, it has becomes a necessity to use various levels and types of cryptography within the scope of many environments.

    Onc critical issue that arrises from this is that it is difficult to compare and contrast various types of cryptographic schema. How does a 1024 bit RSA key stack up against a 1024 bit 3DES key? How does elliptic curve cryptography compare to more common algorithims?

    These kind of questions are difficult to answer, but if you manage an environment where security and cryptography are critical components, they are question you just might need to be able to resolve.
    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"7","type":"x","order":"1","pct":87.5,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.