Created by Mukesh

Symmetric Cryptography algorithms N Authentication algorithms

Description of the widely used symmetric algorithms like IDEA, Blowfish, RC5, RC4, RC2 etc and hash algorithms like MD5, SHA-1, SHA-512, HMAC are provided here..