Unit 3
Overview of Cryptography
The process of writing or solving messages using a secret code. This would be the proper definit...
Asymmetric Encryption
Where encryption and decryption are handled by two different keys. A user will generate a keypai...
Stream Ciphers
A symmetric encryption method that encrypts data one bit at a time. The stream cipher is based o...
Block Ciphers
A symmetric encryption algorithm that encrypts data in set chunks, with varying chunk sizes. Com...
Blockchain
A unique and increasingly popular implementation of cryptography that was developed in 2008. Blo...
Cryptographic Attacks
There is no such thing as a sure thing when it comes to protecting data stored on computer system...
GNU Privacy Guard
An encryption tool that encrypts emails, digitally signs them, and also encrypts documents. GPG ...