Asymmetric Key Encryption

Introduction: – In the earlier tutorial you have learned about the symmetric key encryption and also saw some of the examples and algorithms associated with it. In this tutorial, you will see another type of encryption technique – the asymmetric key cryptography. These techniques are also dependent on the number of keys used and in which form. Asymmetric Key Cryptography: – Asymmetric Key Encryption: These are special encryption technique which is having 2 keys, the public and the private key.

Read more

Symmetric Key Encryption

Introduction: – Till now you have learned about the basic meaning and the motive behind cryptography and the various means of encrypting information. There are more to learn about encryption system. Encoding of plain text is done in two ways and the name is given based on the keys used in encryption. These are: – Symmetric key encryption and Asymmetric key encryption   In this chapter you will learn about the symmetric key encryption. In this type of cryptography, encoding

Read more

Traditional Ciphers

Introduction: –  In this chapter, you will learn about the earlier used cryptographic systems and how these algorithms work out in order to encrypt plain text. These historical cryptographic systems need to be understood in order to learn the complex algorithms. The cipher was the term which gets originated from these earlier cryptographic systems. Before getting into these algorithms, you have to have a basic idea about symmetric key encryption and asymmetric key encryption.   Symmetric Key Cryptography: –

Read more