Asymmetric Encryption
Asymmetric encryption known as public-key cryptographic or public-key encryption, uses mathematically linked public-key and private-key pairs to encrypt and decrypt sender's and recipient's sensitive data.
Asymmetric encryption known as public-key cryptographic or public-key encryption, uses mathematically linked public-key and private-key pairs to encrypt and decrypt sender's and recipient's sensitive data.
Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.
It is the oldest type of cryptography method used in human history, 1900 BC to be precise in the Old Kingdom of Egypt on non-standard hieroglyphs carved into the wall.
You must first create an account to access the content of this website (Absolutely not true, but open the sign-up and login page anyway) Sign Up.
But if you already have an account you can just go ahead and Login.
Cryptography is the practise and study of techniques for secure communication in the presence of third parties.
The basic concept is that there are cases when we want to make sure a given message is read by the sender and the receiver exclusively.
That is what we will be seeing in this website. I hope you will enjoy it.
We will see the most important cryptosystems that were created in history for both symmetric and asymmetric encryptions. After this you will be able to explain to anyone what is symmetric and asymmetric encryption.
PLAINTEXT : the clear message before we encrypt it.
CIPHERTEXT : the message that has been encrypted.
ENCRYPTION : the process of encoding a given message in a way that only the authorized parties can access it.
DECRYPTION : the process of decoding a given ciphertext.
KEY : this is a sequence that is needed both for encryption and decryption.