ABSTRACT
Encryption along with hashing algorithms can also be
used to authenticate the traffic between two network con-
nections. Two types of encryption algorithms are utilized
to encrypt network traffic: symmetric and asymmetric.
Symmetric algorithms use a shared key that is known to
both parties to encrypt the traffic. They are much faster and
require fewer computing resources than asymmetric algo-
rithms. Algorithms of this type include the Advanced
Encryption Standard (AES) and Triple-DES (formed
from the Data Encryption Standard). An important factor
in the implementation of symmetric encryption is the size
of the shared keys that are being used. The size of this key
determines the key space or range of values that the key can
have. The size of the key space is an important factor in
determining the strength of the implementation of an
encryption system. One type of attack, called a brute
force attack, attempts to decrypt the encrypted data by
trying every possible key value in the key space. Larger
key sizes are used to provide more protection against these
attacks. It is important that the key space be of sufficient
size so the amount of time and resources required to
attempt all of the keys in the key space is large enough to
make it impractical to try.