setting up an encryption based network and security protocol in real life situations

  • If you were setting up an encryption-based network, what key size would you choose and why? Explain your answer with examples.
  • How can we apply that security protocol in real life situations?
  • Provide at least two references to support your initial post.