Sai Keerthan Kasulakeerthankasula.hashnode.dev·Apr 11, 2024Part 1 : Cryptography and it's types, Explained!Have you ever wondered how data is securely transferred from one entity to another and what developers actually do to ensure that the transmitted data is secure? How cryptography is involved in dealing with application or information security? Well, ...Discuss·33 readssecure communication
Andreas RenzforEncryptoriumblog.encryptorium.com·Mar 27, 2024Public Key Infrastructure (PKI): An essential part of today's internetIn an era where digital security is more critical than ever, understanding the mechanisms that keep our online interactions secure is vital. One of the cornerstone technologies ensuring the confidentiality, integrity, and authentication (CIA) of digi...Discusspublic key infrastructure
v likeblog.iread.fun·Jan 13, 2024How to encrypt/decrypt a file with a passphrase | key-fileWhy we need to encrypt file File encryption is important for several reasons: Protection against loss or theft: If a device such as a laptop or mobile device is lost or stolen, file encryption protects against the threat of someone being able to rea...Discussencryption
Mrinmoy Porelmrinnnmoy.hashnode.dev·Mar 13, 2023Beginners Guide to Cryptography.Introduction Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public fr...Discuss·41 readsCryptography
Joshua Akosadevwithjosh.com·Mar 8, 2023Cryptography in C# — Asymmetric and Symmetric EncryptionIntroduction Cryptography has always been seen as a complex and intricate concept. While this is true in terms of the actual algorithms entailed, in most modern languages, C# inclusive we have a convenient and relatively stress-free method of impleme...Discuss·12 likes·583 readsCryptography
Sanchit Khuranageniuslearner.hashnode.dev·Feb 7, 2023Understanding Symmetric and Asymmetric Keys: A Comprehensive GuideIntroduction: In the world of cryptography, two types of keys are commonly used to protect sensitive data- symmetric and asymmetric keys. These keys play a critical role in securing digital information and are widely used in various applications like...Discuss·31 readssymmetric-encryption