Sai Keerthan Kasulakeerthankasula.hashnode.dev·May 5, 2024Part 3 : The public key infrastructure and certificate managementWith respect to my previous articles, I explained how encryption and decryption are performed, including the elements used for the hybrid encryption. As we know, we use two keys for asymmetric encryption: a public key and a private key. The term "pub...Discuss·34 readsCertificate Exchange
Sai Keerthan Kasulakeerthankasula.hashnode.dev·Apr 11, 2024Part 1 : Cryptography and it's types, Explained!Have you ever wondered how data is securely transferred from one entity to another and what developers actually do to ensure that the transmitted data is secure? How cryptography is involved in dealing with application or information security? Well, ...Discuss·41 readssecure communication