- If you forget your passphrase and/or keyfile then there is almost no chance of recovering your data.
- Some forms of encryption only offer nominal protection and can be broken easily with the right program e.g an older ZIP archive or Word Document.
- Some encryption programs are too complicated for the everyday user and they may end up using them incorrectly. This could lead to securing data which they did not wish to encrypt or failing to encode data which they did wish to protect.
- The very existence of encryption programs or encrypted files will attract suspicion as to what it is you are trying to protect whereas a non-encrypted system would not attract the same level of interest.
- With reference to the above point, in certain countries such as the UK, Police can use legislation to compel you to reveal passwords to encrypted data. You could face jail time if you failed to comply.
- Certain types of encryption software are banned in some countries. For example, US versions of the program PGP cannot be exported outside the country.
- As Encryption protects your personal data e.g bank details, love letters etc. it also protects drug dealers who make deals from having their messages intercepted, terrorists planning attacks and paedophiles peddling child pornography.
Encryption takes computer processor time. The more complex the encryption the more processing it will take. Encryption keys can become lost rendering the associated data unrcoverable. Encryption that is managed by the user can cause problems in a managed network by rendering necessary files unaccessable to the network managers.
The disadvantage of symmetric cryptography is that it presumes two parties have agreed on a key and been able to exchange that key in a secure manner prior to communication. This is a significant challenge. Symmetric algorithms are usually mixed with public key algorithms to obtain a blend of security and speed.
It is way more complex than any other Cryptography techniques and it also may take longer to Encrypt and Decrypt the data.
it need more processing.
it require more rounds of communication as compare to DES.
Encryption has two major disadvantages, when you encrypt a file it can become corrupt and it can not be opened, or if you loose the key, it is near impossible to decrypt.
it need more processing.
it require more rounds of communication as compare to DES.
It is vulnerable to brute force attacks and DES can be easily broken with attacks.
Symmetric
AES
There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography
There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography
There are two general types of modern cryptography; symmetric cryptography and asymetric (also known as public key) cryptography. Symetric crypto is where both sides have the same shared encryption key, and that key is used to both encrypt and also decrypt any encrypted information. Symmetric crypto is more efficient (faster) than asymmetric crypto, but asymetric crypto works without having to share a key.
Yes
Math algorithms are complex and can easily be broken
Lmfao - do Richard kays coursework by yourself instead of asking others to answer it for you.
Symmetric cryptography only requires one key for both encryption and decryption and therefore in some cases are a issue.
following steps are involved in symmetric cryptography 1- sender creates a ciphertext message by encrypting the plain text message with a symmetric encryption algorithm and a shared key. 2- the sender sends the ciphertext message to the recipient. 3- the recipient decrypts the ciphertext message into plain text with a shared key.
Symmetric cryptography is impractival when a large group is involved.
Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.