They offer simple key management properties. | |
They are based on complex mathematical operations and can easily be accelerated by hardware. | |
They are best used for one-time encryption needs. | |
They are often used for wire-speed encryption in data networks. |
They convert arbitrary data into a fixed-length digest. | |
They are used for encrypting bulk data communications. | |
They are easily reversed to decipher the message context. | |
They are based on a two-way mathematical function. |
Uses IP logging to send alerts | |
Uses inline mode | |
Only supports signatures to look for an attack | |
Implements blocking to stop an attacker |