View on GitHub

networking

Harsh Kapadia's Computer Networking knowledge base.

Cryptography

(Back to Home)

Table of Contents

Introduction

NOTE: When ‘Sign and then Encrypt’ or ‘Encrypt and then Sign’ are talked about, it is important to remember that both the encryption and signing key are from different hosts. The signing key is usually from the one sending the message and the encryption key is usually of the one the message is being sent to.

Types of Cryptography

Ciphers

Feistel

AES

DES, 2DES, 3DES

Blowfish

RC5

Key Exchange

Diffie-Hellman

Hashing

SHA

Digital Signatures

Digital Certificates and Certificate Revocation (OCSP and CRL)

PGP

Perfect Forward Secrecy

Resources