Chapter 2: Cryptographic Tools

 

This chapter provides an overview of the various types of algorithms with a discussion of their applicability. Read all sections of this chapter carefully with an emphasis on following topics:

·         Symmetric algorithms> DES, triple DES and AES. Which of these three algorithms is the strongest and why?

·         Should cryptographic algorithms be made known to public? Why or why not?

·         How is cryptography used in message authentication?

·         Compare MAC and hash techniques as means of message authentication.

·         How is public key encryption different from symmetric key encryption? Which one is more secure? Why?

·         Can cryptography alone achieve total computer/information security? Why or why not?