Combining Various Strengths of Cryptography
Onc critical issue that arrises from this is that it is difficult to compare and contrast various types of cryptographic schema. How does a 1024 bit RSA key stack up against a 1024 bit 3DES key? How does elliptic curve cryptography compare to more common algorithims?
These kind of questions are difficult to answer, but if you manage an environment where security and cryptography are critical components, they are question you just might need to be able to resolve.
Comments powered by CComment