Network Ethical Hacking and Penetration Testing by Samuel Albert

Network Ethical Hacking and Penetration Testing by Samuel Albert

Author:Samuel, Albert
Language: eng
Format: epub, pdf
Published: 2021-08-09T00:00:00+00:00


Symmetric Encryption

DES, 3DES

AES

Asymmetric Encryption

-

RSA, DSA, ECC

Hashing

MD4, MD5

SHA256, SHA512

Also, an application should never use non-standard algorithms. In other words, in-house developed encryption algorithms – or proprietary algorithms – can never be more secure than internationally-approved standard algorithms.

Weak Encryption Keys

Encryption algorithms work by providing a key alongside the message to encrypt. Short keys can be cracked faster than long keys. Thus, it is important to have a long key. Also, the key must be random enough and not a representation of a human chosen password. The following table lists the recommended key length for various cryptographic algorithms:

Cryptographic Algorithm

Insecure Length

Secure Length



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.