Through part I we’ve seen what exactly we are trying to achieve through security; we’ve also seen what types of encryption there is and looked at three examples. In part II we learnt that signing is the same as encrypting a message-digest with a private key. However if we need to actually encrypt a message, we would use public-key encryption.  One thing… Continue reading

In a part I I’ve briefly touched on the differences between Symmetric and Asymmetric key encryption; Ie’ve also touched on hashing  and provided three examples of different encryption/decryption scenarios. It became very clear in those that it is very easy to get trap into a false sense of security – we encrypt data, though we then need… Continue reading