Symmetric Key Algorithms

You already learned about symmetric key ciphers and the major issue with symmetric keys. Read the section in this article on symmetric key encryptions to learn more about the advantages and disadvantages of symmetric keys. There is more information about symmetric key ciphers in this article that will be covered in more detail later in this unit, but this article will give you a preview of 3DES, IDEA, and AES ciphers. View the flashcard tool as well to better understand and to learn the terms used in cryptography such as plaintext, ciphertext, key, encryption, decryption, countermeasure, symmetric key encryption, and block cipher.

1. Introduction

Cryptography is used to provide confidentiality and integrity, two of the tenets of the CIA triad. It employs encryption to make data unreadable by transforming it into ciphertext. In addition, cryptography is used to provide assurance of a message's author, source authentication, and delivery proof. This lesson discusses cryptography techniques and implementations used to secure data in the enterprise.




Source: Dominique Hubbard, https://www.edjet.com/scorm-content/edjet-prod-uploads/1bbb6bd2940fd96497953e96a7011e315c141cf3/771aacefbe2ed9e16b17173a36b691df/story_content/WebObjects/6MLNkf2prXH/lesson03/index.html
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.