Algorithms are primarily characterized as either symmetric
or asymmetric.
Briefly, symmetric encryption uses a single key to encrypt
and decrypt. Asymmetric uses two keys. Read more ... |
ISSC Security >
ISSC Security >
Cryptographic Algorithmsposted 26 Dec 2009, 07:49 by Kanav Gupta [ updated 26 Dec 2009, 07:51 ]
|