Modern Encryption have a common protocol all over the world, only key will kept in secret, modern cryptography divided into three categories.

- symmetric
- Asymmetric
- Hash

**SYMMETRIC ENCRYPTION**

it uses the same key for encryption and decryption, the key which is used for sharing between two parties commonly know as secret-key or pre-shared key, Main advantages of symmetric encryption its comparatively fast as both end knows same key and key-word should be more complicated if we want to have a secure encryption, Main disadvantages are as key is the only keynote for symmetric encryption transfer of key should be kept highly confidential. below are algorithm support on symmetric encryption

DES – Data Encryption Standard, its also known as data encryption algorithm, it was designed by IBM in 1976 its operating by 5 modes

- Electric Code Book (ECB)
- Cipher Block Chaining (CBC)
- Cipher Feedback (CFB)
- Output Feedback (OFB)
- Counter Mode (CTR)

since the growth of advance technology and invention of high processer leads to DES as not secure one, it had a brute force attack , because of this issue had leads to the development of 3des

3DES – its also knows triple data encryption algorithm or TDES, it will encrypt the packet three time than DES algorithm, it was accepted by USA in 1999.

IDEA – International Data Encryption Algorithm, its also a symmetric Encryption algorithm and current one which approved and used in most the devices are AES

AES – Advanced Encryption Standard Algorithm ,its support 256 key bits ,still now this algorithm is never hacked, AES was designed to replace DES ,3DES and IDEAS type algorithm.

AES was approved by NIST in 1997 as the replacement for DES algorithm, is more secure than DES/3DES and its fast and efficient in both hardware and software

other type of symmetric algorithms are bluefish and two fish

Stay with us for more post on encryption technology…

yes…now a days we are using AES encryption in most of the firewall

still lots to go, we will give a brief explanation about firewall technology in our future post.