ISSC Security‎ > ‎

Cryptographic Algorithms

posted 26 Dec 2009, 07:49 by Kanav Gupta   [ updated 26 Dec 2009, 07:51 ]
Algorithms are primarily characterized as either symmetric or asymmetric. 
Briefly, symmetric encryption uses a single key to encrypt and decrypt. Asymmetric uses two keys. Read more ...
Comments