From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Desirable qualities of an algorithm and key, continued
From the course: Ethical Hacking: Cryptography
Desirable qualities of an algorithm and key, continued
- [Presenter] Now it's time to talk about what are the desirable qualities of a key as the other key factor in securing a cryptosystem? When we review encryption algorithms individually later in this course, you'll learn that some allow you to select the length of the encryption key. While the general rule is the longer the key, the better, we must also consider trade-offs that as the key length gets longer, so does the amount of time it takes to respond, which could also lead to performance issues. Let's take a look at a simple chart. On the X axis, you can see clearly the relationship that as the key length increases, so does the response time in seconds displayed on the Y axis. Seconds doesn't sound like much, but scaled up, it can become a major setback, causing us to take a deeper look at balancing resource consumption in different scenarios. The next desirable quality of a key is simply being random. Keys are generated using random number generations or key derivation functions,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.