answersLogoWhite

0

- If you forget your passphrase and/or keyfile then there is almost no chance of recovering your data.

- Some forms of encryption only offer nominal protection and can be broken easily with the right program e.g an older ZIP archive or Word Document.

- Some encryption programs are too complicated for the everyday user and they may end up using them incorrectly. This could lead to securing data which they did not wish to encrypt or failing to encode data which they did wish to protect.

- The very existence of encryption programs or encrypted files will attract suspicion as to what it is you are trying to protect whereas a non-encrypted system would not attract the same level of interest.

- With reference to the above point, in certain countries such as the UK, Police can use legislation to compel you to reveal passwords to encrypted data. You could face jail time if you failed to comply.

- Certain types of encryption software are banned in some countries. For example, US versions of the program PGP cannot be exported outside the country.

- As Encryption protects your personal data e.g bank details, love letters etc. it also protects drug dealers who make deals from having their messages intercepted, terrorists planning attacks and paedophiles peddling child pornography.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

Is DES symmetric or asymmetric cryptography?

Symmetric


What is a common symmetric cryptography solution?

AES


What are the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What the the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What are the Disadvantages of symmetric key cryptography?

Symmetric key cryptography has several disadvantages, primarily the challenge of secure key distribution, as both parties must share the same secret key without interception. Additionally, if the key is compromised, all data encrypted with that key becomes vulnerable. Moreover, managing multiple keys for different users can become complex, as the number of keys increases exponentially with the number of participants. Lastly, symmetric encryption does not provide non-repudiation, making it difficult to prove the origin of a message.


Which is not a disadvantage of symmetric cryptography in IA?

Math algorithms are complex and can easily be broken


Does symmetric cryptography use the same key to encrypt and decrypt a message?

Yes


How asymmetric cryptography both requires and support the use of symmetric cryptography?

Lmfao - do Richard kays coursework by yourself instead of asking others to answer it for you.


What is a disadvantage of symmetric cryptoghrapy?

Symmetric cryptography only requires one key for both encryption and decryption and therefore in some cases are a issue.


What are the steps involved in symmetric cryptography Also explain key management in conventional cryptography using some example?

following steps are involved in symmetric cryptography 1- sender creates a ciphertext message by encrypting the plain text message with a symmetric encryption algorithm and a shared key. 2- the sender sends the ciphertext message to the recipient. 3- the recipient decrypts the ciphertext message into plain text with a shared key.


What statement relating to access control is accurate?

Symmetric cryptography is impractival when a large group is involved.


What is a symmetric encryption?

Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.