O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Strong cryptography

So what does it take to make a good algorithm and cryptosystem? Following are some of the primary components of a strong algorithm and cryptosystem.

  • The algorithm and system must not have any mathematical or logical weaknesses that might provide a back door for the attacker.

  • The keys used should be of sufficient length and highly randomized, and key management issues should be addressed and securely managed.

  • The next thing to consider is the notion that when an IT environment is implemented securely, the only thing the bad guys ever get to see is ciphertext, so you must hide the nature of the encryption key in the resulting ciphertext. To say it another way, the ciphertext should not be linearly related to the encryption key. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required