Cryptographic Algorithms (WIP)
Cryptographic algorithms are methods used to secure data through encryption, hashing, and key exchange techniques. They ensure the confidentiality, integrity, and authenticity of information in digital communications.
1- RSA (Asymmetric Encryption): RSA is a public-key encryption algorithm that uses two keys, one for encryption and one for decryption. It is widely used for secure data transmission.
2- AES (Symmetric Encryption): AES (Advanced Encryption Standard) is a symmetric encryption algorithm that uses the same key for both encryption and decryption. It is known for its speed and security.
3- SHA-256 (Hashing): SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function that produces a fixed-size 256-bit hash value. It is commonly used for data integrity verification.
4- Diffie-Hellman (Key Exchange): Diffie-Hellman is a key exchange algorithm that allows two parties to securely share a secret key over an insecure channel. It is fundamental to many cryptographic protocols.
5- Bcrypt (Hashing): Bcrypt is a password hashing function designed to be computationally intensive to protect against brute-force attacks. It incorporates a salt to protect against rainbow table attacks.