Categories
Computer Science

Cryptographic Algorithms

One the most effective ways to achieve national cyber security involves encryption of information using cryptographic algorithms. These algorithms rely on keys to encrypt data, making it impossible for unintended users to intercept and view information on a network. Based on the nature of the keys, the algorithms can be classified into secret and public. In secret key-based encryption, also called symmetric algorithms, sender and receiver use a common private key to scramble and unscramble communication (Ogletree, 2004). The sender uses a key to code plaintext, while the receiver relies on the same key to decipher ciphertext. This implies the algorithm enhances security of information, as only the sender and receiver can only understand a coded message. However, it has numerous disadvantages. Both parties in a network are required to keep the encryption key secure. It is also inappropriate for distributed environments, as it requires users to have many different keys to communicate in a network. It does not also effectively guarantee data confidentiality because it is not easier to alter the secret key regularly.