uItems that should be addressed include, but are not limited to:
uStrengths of using this form of cryptography
uWeaknesses of using this form of cryptography
uDescription of algorithms that implement symmetric cryptography and strengths / weaknesses of each algorithm
uRelevant examples of modern applications / industry that utilize symmetric cryptography
uWhy does symmetric cryptography work best for these applications?
Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.