## Key must be distributed

- Vulnerable to interception (an important weakness)
- Key management – a challenge

## Strength of encryption

- Length of the secret key
- Longer keys more difficult to crack (more combinations to try)

- Not necessary to keep the algorithm secret

- Length of the secret key

## How to break an encryption

- Brute force: try all possible combinations until the correct key is found

Previous slide | Next slide | Back to first slide | View graphic version |