They are often used for wire-speed encryption in data networks. | |
They are best used for one-time encryption needs. | |
They offer simple key management properties. | |
They are based on complex mathematical operations and can easily be accelerated by hardware. |
They are based on a two-way mathematical function. | |
They convert arbitrary data into a fixed-length digest. | |
They are easily reversed to decipher the message context. | |
They are used for encrypting bulk data communications. |
Only supports signatures to look for an attack | |
Uses inline mode | |
Implements blocking to stop an attacker | |
Uses IP logging to send alerts |