Page 116 - CISSO_Prep_ Guide
P. 116
Symmetric algorithms are fast, and most are free. Some of the
common examples are AES, RC5 and RC6, MARS, Serpent,
and Blowfish. These are all tested and proven products that can
be used for data encryption for transmission and storage. The
older algorithm of DES is no longer trusted. RC4 is a stream-
based cipher used in wireless products that use WEP (no longer
trusted) or WPA. WPA2 is based on the implementation of
AES.
The weaknesses of symmetric algorithms are mostly related to
key distribution and management. To use the symmetric
algorithm, both the originator and receiver of the message must
have the same key. This means that either person can read or
alter the message, and no one can prove whom the last person to
access the message was. This also means that every pair of