Professional Documents
Culture Documents
on
Cryptography
Submitted by:
Monika Sharma
1606048
CSE-6th Sem.
Cryptography
DES
Triple-Des
Blowfish
IDEA
Cast
RC4
RC5
TwoFish
WHAT IS PUBLIC KEY
CRYPTOGRAPHY ?
Cryptography
Public Key Cryptographic Algorithms
RSA
Diffie-Hellman
Elliptic curve
Hash Functions
Hash functions, also called message digests and
one-way encryption, are algorithms that, in some
sense, use no key .
Among the most common hash functions in use
today in commercial cryptographic applications
are:
• MD2 (RFC 1319)
• MD4 (RFC 1320)
• MD5 (RFC 1321)
• The Secure Hash Algorithm (SHA) ,in
particular, the SHA-1
Why Three Encryption Techniques?