From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Limitations of encryption algorithms

Limitations of encryption algorithms

From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Start my 1-month free trial

Limitations of encryption algorithms

- [Instructor] Every security control has limitations and weaknesses and encryption algorithms are no exception. As a security professional, you should be aware of the different limitations that exist with different approaches to encryption. First, different encryption algorithms have different performance profiles. The speed of one algorithm may be much faster than the speed of another depending upon the computational overhead involved. For example, asymmetric encryption algorithms are generally much slower than symmetric encryption algorithms. Algorithms get stronger as you increase the size of the encryption key that you use with the algorithm. The longer the key, the more resistant it is to brute force attacks. However, this leads to a resource for security constraint. Longer keys might be more secure, but they also require more computing power, and therefore, take longer to perform encryption and decryption…

Contents