Tiny Encryption Algorithm is a simple, powerful & notably fast encryption algorithm. Although TEA algorithm has a few weaknesses as it suffers from equivalent keys (Which…

A deterministic algorithm is an Algorithm in which for a given input, the computer will always produce the same output by going through the same states…

This is the simplest kind of Cryptography that involves only one secret key to encrypt and decrypt information. It is also known as “Secret Key…

Asymmetric cryptography, also known as public key cryptography, it uses two distinct, yet related keys. One key, the Public Key, is used for encryption and…

Cryptography categorized based on number of keys used for encryption and decryption; Below are list of cryptography catgories Secret Key Cryptography – It is also…

In Part I, I have written code to encrypt the plain text for demonstration purpose . In this article we will use Brute Force technique to…

The Caesar cipher is one of the earliest known and simplest ciphers; Created and used in 44 BC by Julius Caesar. It is a type…

Brute force is a straight forward strategy to solving a problem, it’s also called as ‘Exhaustive Search’ in which you try all possibilities to reach…

.Net Framework provides in built support for various hash functions like MD-5, SHA-1, SHA-256 etc… ComputeHash method Computes the hash value to the specified…

SHA-256 (Secure Hash Algorithm), is one of the cryptographic hash function, commonly used in Blockchain. It generates an almost-unique 256-bit (32-byte) signature for a text. …