This is the simplest kind of Cryptography that involves only one secret key to encrypt and decrypt information. It is also known as “Secret Key…

Asymmetric cryptography, also known as public key cryptography, it uses two distinct, yet related keys. One key, the Public Key, is used for encryption and…

Cryptography categorized based on number of keys used for encryption and decryption; Below are list of cryptography catgories Secret Key Cryptography – It is also…

In Part I, I have written code to encrypt the plain text for demonstration purpose . In this article we will use Brute Force technique to…

The Caesar cipher is one of the earliest known and simplest ciphers; Created and used in 44 BC by Julius Caesar. It is a type…

Brute force is a straight forward strategy to solving a problem, it’s also called as ‘Exhaustive Search’ in which you try all possibilities to reach…

.Net Framework provides in built support for various hash functions like MD-5, SHA-1, SHA-256 etc… ComputeHash method Computes the hash value to the specified…

SHA-256 (Secure Hash Algorithm), is one of the cryptographic hash function, commonly used in Blockchain. It generates an almost-unique 256-bit (32-byte) signature for a text. …

Hashing is process of converting any size of data into fix size of data by performing mathematical operations. A message to be hashed is called…

Cryptograph means secret writing, in order to make information secret we use cipher, an algorithm that converts plain text to cipher-text. Cipher has been used…