In a part I I’ve briefly touched on the differences between Symmetric and Asymmetric key encryption; Ie’ve also touched on hashing  and provided three examples of different encryption/decryption scenarios. It became very clear in those that it is very easy to get trap into a false sense of security – we encrypt data, though we then need… Continue reading