64
I wonder why they used an assymetric algo.
I wonder why they used an assymetric algo.
Maybe for performance so as to decrease the chances of detection
Edit: sorry disregard my comment, I read that as "symmetric". In the case of asymmetric they can only deploy one part of the key which if intercepted cannot be used to decrypt.
Yeah that makes sense, I figured they'd just spin up a symmetric key, use it, send it home and delete it locally.
Why would they use a symmetric algorithm?
Uncrackable.
I mean big assymetrics are too, but it's more complicated to use and much slower.
Can someone elaborate? I'm not as informed...
Check my comment to flyswat.
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Enjoy!