
Secret Key Cryptography – A Brief Guide
Encryption and decryption using a secret key To secretly communicate with Bob, Alice encrypts her messages before sending them. There are many techniques (cryptographic algorithms) that she…

Public Key Cryptography – A Brief Guide
When using public key cryptography, Alice and Bob both have their own key pairs. A key pair consists of a public key and a private key. If…