
14 IBM Business Process Manager Security: Concepts and Guidance
key also only puts some data in danger. A compromised algorithm is as bad as it gets. All
data ever encrypted with this algorithm becomes public.
In addition, public algorithms are subject to public scrutiny, and over time any potential flaws
are very likely to be exposed. For example, the IBM Data Encryption Standard (DES)
encryption was in use for over 20 years, subject to plenty of public scrutiny, and with a modern
modification (Triple DES), it is still a viable encryption algorithm today.
Modern ciphers are distinguished by two criteria:
Type of key used (symmetric private k ...