Secret Key Cryptography Techhyme

Secret Key Cryptography – A Brief Guide

Encryption and decryption using a secret key To secretly communicate with Bob, Alice encrypts her messages before sending them. There are many techniques (cryptographic algorithms) that she can use. All these algorithms have…

Read more
Public Key Cryptography Techhyme

Public Key Cryptography – A Brief Guide

When using public key cryptography, Alice and Bob both have their own key pairs. A key pair consists of a public key and a private key. If the public key is used to…

Read more