1.

How Do You Gauge The Strength Of The Key, What Is The Parameter Used?

Answer»

The algorithm should be known to the public; but the KEY needs to be confidential:

  1. Key size
  2. Performance/ Response time for Encryption or Decryption (depends on the SYSTEM we use)
  3. MATHEMATICAL proof for standardization of security provided by that algorithm
  4. Who provided the certificate for the algorithm and the DATE of expiration date.

The algorithm should be known to the public; but the key needs to be confidential:



Discussion

No Comment Found