<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:series="https://publishpress.com/"
	
	>
<channel>
	<title>
	Comments on: Symmetric Encryption	</title>
	<atom:link href="https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/</link>
	<description>Networking presented simply, practically, and applicably</description>
	<lastBuildDate>Tue, 02 Feb 2021 02:27:13 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Ed Harmoush		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-227384</link>

		<dc:creator><![CDATA[Ed Harmoush]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 02:27:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=80#comment-227384</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-227219&quot;&gt;gidify&lt;/a&gt;.

Correct, the listed algorithms are not hashing algorithms. 

The different is hashing algorithms can not be &quot;decrypted&quot;, they are one way operations. &quot;Encryption&quot; without the ability to decrypt the content does not help solve the problem of Confidentiality.

Hope this helps.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-227219">gidify</a>.</p>
<p>Correct, the listed algorithms are not hashing algorithms. </p>
<p>The different is hashing algorithms can not be &#8220;decrypted&#8221;, they are one way operations. &#8220;Encryption&#8221; without the ability to decrypt the content does not help solve the problem of Confidentiality.</p>
<p>Hope this helps.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: gidify		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-227220</link>

		<dc:creator><![CDATA[gidify]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 15:04:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=80#comment-227220</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-227219&quot;&gt;gidify&lt;/a&gt;.

Mispelling on the 3rd line.  Should read    ...&quot;only use HASH functions...&quot;]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-227219">gidify</a>.</p>
<p>Mispelling on the 3rd line.  Should read    &#8230;&#8221;only use HASH functions&#8230;&#8221;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: gidify		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-227219</link>

		<dc:creator><![CDATA[gidify]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 15:02:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=80#comment-227219</guid>

					<description><![CDATA[Since the output of the above name symmetric encryption algorithms are variable in length, and since hash algorithms outputs are always of the same length, I would conclude that these listed symmetric algorithms are not hash algorithms, correct?  If so, then why wouldn&#039;t programmers only use has functions as this would allow even asymmetric functions to output a standard length string, and thereby eliminate the drawback of increased output length?]]></description>
			<content:encoded><![CDATA[<p>Since the output of the above name symmetric encryption algorithms are variable in length, and since hash algorithms outputs are always of the same length, I would conclude that these listed symmetric algorithms are not hash algorithms, correct?  If so, then why wouldn&#8217;t programmers only use has functions as this would allow even asymmetric functions to output a standard length string, and thereby eliminate the drawback of increased output length?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Ed Harmoush		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-75399</link>

		<dc:creator><![CDATA[Ed Harmoush]]></dc:creator>
		<pubDate>Wed, 13 Jun 2018 22:00:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=80#comment-75399</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-75375&quot;&gt;Hamza Saeed&lt;/a&gt;.

Then it isn&#039;t &quot;Cryptographic Encryption&quot; which requires the usage of a key. It is merely an obfuscation of the original message. 

The problem with doing encryption with a Key is that it is difficult to come up with a secure method of transforming Plain text into Cipher text. If you DO come up with a way, you have to come up with a new way for every person you speak with (otherwise, each person will be able to decrypt the messages you send to the other). 

A modern encryption algorithm involves math that has been vetted by professional mathematicians and cryptographers in combination with some sort of secret key. People like us (non-cryptographers) can simply use a commonly approved algorithm, and then generate a new key for each session we wish to secure.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-75375">Hamza Saeed</a>.</p>
<p>Then it isn&#8217;t &#8220;Cryptographic Encryption&#8221; which requires the usage of a key. It is merely an obfuscation of the original message. </p>
<p>The problem with doing encryption with a Key is that it is difficult to come up with a secure method of transforming Plain text into Cipher text. If you DO come up with a way, you have to come up with a new way for every person you speak with (otherwise, each person will be able to decrypt the messages you send to the other). </p>
<p>A modern encryption algorithm involves math that has been vetted by professional mathematicians and cryptographers in combination with some sort of secret key. People like us (non-cryptographers) can simply use a commonly approved algorithm, and then generate a new key for each session we wish to secure.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Hamza Saeed		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/symmetric-encryption/#comment-75375</link>

		<dc:creator><![CDATA[Hamza Saeed]]></dc:creator>
		<pubDate>Wed, 13 Jun 2018 19:33:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=80#comment-75375</guid>

					<description><![CDATA[what if we only decrypt the data &#038; we don&#039;t have any secret key ....Is that possible ?Please reply]]></description>
			<content:encoded><![CDATA[<p>what if we only decrypt the data &amp; we don&#8217;t have any secret key &#8230;.Is that possible ?Please reply</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
