This chapter provides an overview of the various types of algorithms with a discussion of their applicability. Read all sections of this chapter carefully with an emphasis on following topics:
· Symmetric algorithms> DES, triple DES and AES. Which of these three algorithms is the strongest and why?
· Should cryptographic algorithms be made known to public? Why or why not?
· How is cryptography used in message authentication?
· Compare MAC and hash techniques as means of message authentication.
· How is public key encryption different from symmetric key encryption? Which one is more secure? Why?
· Can cryptography alone achieve total computer/information security? Why or why not?