The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length encrypted…
Being human, we always concern about our privacy. Privacy plays a significant role in our lives, right from starting on the day till the end…
RC4 (Rivest Cipher 4) was designed by Ron Rivest. It is remarkable for its speed and simplicity. It widely used in many applications and protocols. Though, there are…
In this article, we will demonstrate eXtended Tiny Encryption Algorithm (XTEA). Don’t forget to read the Part I of TEA. XTEA (eXtended TEA) is a…
Tiny Encryption Algorithm is a simple, powerful & notably fast encryption algorithm. Although TEA algorithm has a few weaknesses as it suffers from equivalent keys (Which…
This is the simplest kind of Cryptography that involves only one secret key to encrypt and decrypt information. It is also known as “Secret Key…
Asymmetric cryptography, also known as public key cryptography, it uses two distinct, yet related keys. One key, the Public Key, is used for encryption and…
Cryptography categorized based on number of keys used for encryption and decryption; Below are list of cryptography catgories Secret Key Cryptography – It is also…
In Part I, I have written code to encrypt the plain text for demonstration purpose . In this article we will use Brute Force technique to…
The Caesar cipher is one of the earliest known and simplest ciphers; Created and used in 44 BC by Julius Caesar. It is a type…