Organizations across private and public sectors may use a variety of encryption technologies for various purposes.
Answer the following question(s):
If the data is not encrypted and only HTTPS is in place, the data is in readable form before being sent further inside the private network protected by a firewall. Operators of the firewall can intercept, change or manipulate the data.
The main advantage is that using a proprietary algorithm gives you access to trade secrets like additional cryptographic attacks that other algorithms fall to but to which the proprietary algorithm is resistant.Using a well vetted encryption algorithm provides a better assurance of security. There may be cryptographic algorithm flaws and/or coding mistakes.As noted, relying on the algorithm being private just adds a layer of false security.
Get Answers For Free
Most questions answered within 1 hours.