#Cryptography

Securing information by transforming it into an unreadable format

Learn to Secure your #INFO

Encryption&Decryption || Encodig&Decoding || Hashing

Benefits from these:

# Confidentiality, Data Protection, Secure Communication

# Data Access, Privacy, Efficiency

# Data Transformation, Data Retrieval, Compatibility

# Data Integrity, Data Verification, Password Storage

Concepts

Symmetric Encryption

Symmetric encryption is a type of encryption where the same key is used for both the encryption and decryption of data.

Example: AES (Advanced Encryption Standard):

Asymmetric Encryption

Asymmetric encryption, also known as public-key encryption, uses a pair of keys - a public key for encryption and a private key for decryption.

Example: RSA (Rivest-Shamir-Adleman)

Encoding & Decoding

Encoding and decoding are processes used to convert data between different representations.

Examples : base64, base10, and base16 (hexadecimal):

Hashing

Hashing is a process used in computer science and cryptography to convert data into a fixed-size string of characters(hexadecimal number). It takes an input message and return a fixed-length string, which appears random but is deterministic.

Examples: sha-256, sha-384, and sha-512

Mujahid Shaik

Resume:

https://drive.google.com/file/d/1HaZvGykiyXz9O1JccTjvaJ_lvlRnGegW/view?usp=sharing