|Create Date||September 24, 2014|
|Last Updated||April 16, 2015|
The technology to secure communications is well-known. Nevertheless, a lot of channels transporting critical information are still not correctly protected. The main reason is that security protocols rely on cryptographic algorithms that are very compute intensive.
This white paper outlines the differences between symmetric and asymmetric cryptography. It also discusses the benefits and problems that are associated with each one.
|Engaging Smart Engine for Public Key cryptography|