This paper presents the results of a study undertaken to research some of the most commonly used encryption algorithms firstly to identify as many of their weaknesses and vulnerabilities as possible, and secondly to identify the aspects of these weaknesses that can be avoided by correct implementation.

For more information on encryption algorithms, visit Discretix Technologies’ Web site.