0
(0)
Modern cryptography uses public algorithms with secret material (keys). These public algorithms are arrived at through large scale “competitions” in which people compete to produce the most secure but efficient algorithm while also inspecting each other’s algorithms (see the NIST AES selection process). In this model of a publicly known encryption algorithm, the most protected element will be the key. Do you think it would enhance security to also have a secret algorithm agreed upon with your communication partners? Defend your answer.
Parameters
- Posts should be 250 to 300 words in length
- Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
- All sources should be used in the content of the post using APA format
How useful was this post?
Click on a star to rate it!
Average rating 0 / 5. Vote count: 0
No votes so far! Be the first to rate this post.