Types of message digest hashing

I talked about message digests in minor detail on my previous post.  Message digest hashing algorithms can be used for digital signature when a massive message must be hashed in a secure manner.  A digital signature is something that’s created when the digest of…

Steganography Basic – The art of hiding Data Within Data

Steganography doesn’t use algorithms to encrypt data, instead it hides a data in another type of media, so it effectively conceals the data hidden within a type of media.  This type of cryptography is similar to an invisible ink method,…

In band/Out of band key exchange

There are multiple ways to exchange keys, whether it’s public or private.  I want to cover in band and out of band key exchange as well as other items related to key exchanges. In band key exchanges mean it takes…

Hashing and message digest basics

Hashing is different from encryption because hashing is designed to act as one way function.  An algorithm that is easy to perform but difficult (almost impossible) to reverse.  A hash is a string of number generated from a string of…

Symmetric and asymmetric encryption algorithms

Symmetric encryption is also known as secret key encryption or session key encryption.  This means that it uses the same key to encrypt and decrypt data.  A simple example would be moving 1 space forward for encryption and 1 space…