Cryptography Part II

The famed Enigma Machine, considered to be an Engineering Marvel in the field of Cryptography


Types of Encryption

Symmetric Encryption

Truth Table for XOR

Asymmetric Encryption Algorithm

1. Key Generation:

2. Encryption

3. Decryption


Symmetric Encryption Algorithm

Asymmetric Encryption Algorithm

Google uses Elliptic Curve Cryptography
Amazon uses a 2048-bit RSA Cryptography


Symmetric Encryption

This Attack defined in the above paragraph is normally called a Man-In-The-Middle attack

Asymmetric Encryption




Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Swagat Jena

Swagat Jena

A learner trying new ventures. I wish to build skills and network by sharing knowledge. Feel free to comment suggestions on the posts.