Page 116 - CISSO_Prep_ Guide
P. 116

Symmetric algorithms are fast, and most are free. Some of the
            common examples are AES, RC5 and RC6, MARS, Serpent,
            and Blowfish. These are all tested and proven products that can
            be used for data encryption for transmission and storage. The
            older algorithm of DES is no longer trusted. RC4 is a stream-
            based cipher used in wireless products that use WEP (no longer
            trusted) or WPA. WPA2 is based on the implementation of
            AES.

            The weaknesses of symmetric algorithms are mostly related to
            key distribution and management. To use the symmetric
            algorithm, both the originator and receiver of the message must
            have the same key. This means that either person can read or
            alter the message, and no one can prove whom the last person to
            access the message was. This also means that every pair of
   111   112   113   114   115   116   117   118   119   120   121