|
Not marketing, my opinion, expressed here, is based on UniversityAn encryption algorithm is good if and only if an "enemy" can notRaul, it sounds like you've swallowed the "marketing" - hook, line, and
recover any information about the original message from the encrypted
one, unless he has the key.
sinker. I'm in favor of key-based algorithms, but keys can be compromised
in a number of ways.
Only if the algorithm is bad.Knowing everything about the algorithm must not be of any help toOn the contrary, knowing how an algorithm is modified by a key provides
recover the original message or the key.
clues about keys.
A secret algorithm will be written by somebody that is probably not aA secret "algorithm" is not completely secret, unless you kill theKeys are not completely secret either. The question is whether you want
author. :-)
multiple layers of defense, or not. A secret algorithm is an additional
layer of defense.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact copyright@midrange.com.
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.