Cryptography
Cryptography
3 Authentication
Verify the identity of the communicating parties and determine if they can be trusted.
History of Cryptography
1 In ancient times, secret codes like Caesar Cipher and Scytale were
used to send covert messages.
3 The advent of computers paved the way for the rise of powerful
encryption algorithms like RSA and AES.
Types of Cryptographic Algorithms
Symmetric Key Cryptography Asymmetric Key Cryptography
Both the sender and receiver use the same Also known as public-key cryptography, it
key to encrypt and decrypt the data. utilizes different keys for encryption and
decryption.
Applications of Cryptography