Implementing encryption protocols

WEP, which stands for wireless encryption protocol, provides encrypted communication between wireless clients and access points.  WEP uses key encryption algorithm to encrypt messages between devices.  Each client and access point on the wireless LAN must use the same encryption key.  The key has to be and is manually configured on each access…

Problem statement and its importance

I just read “The Most Underrated Skill in Management” written BY NELSON P. REPENNING, DON KIEFFER, and TODD ASTOR.  The article written by these MIT professors discuss how neglecting to formulate a clear problem statement often prevents innovation and leads to wasted time and money.  I believe that reading this article may improve your…

Types of asymmetric encryption algorithms

On my last post, I’ve talked about the types of symmetric encryption algorithms.  Today, I’ll be covering different types of asymmetric encryption algorithms. RSA is one of the most popular asymmetric public key algorithms because it was technically the first of its kind.  It stands for the names for those…

Types of symmetric encryption algorithms

Let’s talk about the types of symmetric encryption algorithms.  You can read about how symmetric encryption works by clicking here.  The types of symmetric encryption algorithms I want to cover today are DES, 3DES, AES, Blowfish, twofish, IDEA, and RC4.  Basically the ones that’ll show up on your security+ exam. Let’s…

Types of message digest hashing

I talked about message digests in minor detail on my previous post.  Message digest hashing algorithms can be used for digital signature when a massive message must be hashed in a secure manner.  A digital signature is something that’s created when the digest of the message is encrypted using the private key of a…