Remove 2001 Remove Architecture Remove Firmware Remove Social Engineering
article thumbnail

Types of Encryption, Methods & Use Cases

eSecurity Planet

Phishing and social engineering are common ways threat actors can obtain a symmetric key, but cryptanalysis and brute force attempts can also break symmetric key ciphers. By 2001, the NIST dubbed it the Advanced Encryption Standard (AES) and officially replaced the use of DES.