By Unknown Monday, April 18, 2016 cryptography Internet security technology What is SSL (Secure Sockets Layer) Certificate and How it Work: A Novice Guide If you use The Internet frequently, then you might know about SSL (Secure Sockets Layer) . Now, if you don’t know much about SSL/SSL Certi...
By Unknown Friday, February 5, 2016 cryptography security RSA (Rivest-Shamir-Adleman) Encryption What is RSA Encryption? RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Tech...
By Unknown 4:54 AM cryptography security Blowfish Encryption Algorithm: [Explanation with Examples] What is Blowfish Encryption? Blowfish is an another algorithm designed by Bruce Schneier in 1993 to replace DES. This symmetric cipher split...
By Unknown 4:52 AM cryptography security What is 256 Bit Encyption in Cryptography? Encryption is the process of using an algorithm to transform information to make it unreadable for unauthorized users. This cryptographic me...
By Unknown 4:48 AM cryptography security PBKDF2 (Password Based Key Derivation Function 2 Algorithm) What is PBKDF2? PBKDF2 is used in WPA-2 and TrueCrypt. Its main focus is to produce a hashed version of a password and includes a salt to re...
By Unknown 4:43 AM cryptography security SHA-256 (Secure Hash Algorithm): Detailed Study Secure Hash Algorithm - 256 You can't decrypt SHA-256 as it is not an encryption algorithm . A lot of people are under the impression t...
By Unknown 4:39 AM cryptography security What is Public Key Cryptography? Before proceeding for public key cryptography, you should first read and know what is cryptography and how it works. This article will help ...