Cryptography Part II

The famed Enigma Machine, considered to be an Engineering Marvel in the field of Cryptography

Introduction

Types of Encryption

Symmetric Encryption

Truth Table for XOR

Asymmetric Encryption Algorithm

1. Key Generation:

2. Encryption

3. Decryption

Advantages

Symmetric Encryption Algorithm

Asymmetric Encryption Algorithm

Google uses Elliptic Curve Cryptography
Amazon uses a 2048-bit RSA Cryptography

Disadvantages

Symmetric Encryption

This Attack defined in the above paragraph is normally called a Man-In-The-Middle attack

Asymmetric Encryption

Work-Around

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store