64
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 17 Mar 2025
64 points (100.0% liked)
cybersecurity
3939 readers
2 users here now
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
founded 2 years ago
MODERATORS
I wonder why they used an assymetric algo.
Maybe for performance so as to decrease the chances of detection
Edit: sorry disregard my comment, I read that as "symmetric". In the case of asymmetric they can only deploy one part of the key which if intercepted cannot be used to decrypt.
Yeah that makes sense, I figured they'd just spin up a symmetric key, use it, send it home and delete it locally.
Why would they use a symmetric algorithm?
Uncrackable.
I mean big assymetrics are too, but it's more complicated to use and much slower.
Can someone elaborate? I'm not as informed...
Check my comment to flyswat.