First page Back Continue Last page Overview Graphics
Features of symmetric cipher systems
Fast to encrypt and decrypt, suitable for large volumes of data, and real time applications.
A well designed symmetric cipher can only be attacked through brute-force exhaustion of the key space.
- 40, 48, 56, and 64bit ciphers have been successfully attacked by brute force means. ASIC based hardware costing on order of $100K can attack 56bit ciphers in minutes or hours.