December 2017
Intermediate to advanced
410 pages
11h 5m
English
In this scenario, a single key is used to encrypt all the sensitive data. The challenge here is that if the key is compromised, then all the data can be easily decrypted.
The second challenge is that if the algorithm through which the data is encrypted is broken, then it will re-require to use a better algorithm that would need to decrypt all the data and re-encrypt them, which is a lot of hassle when you have tons of data:

Read now
Unlock full access