This commit is contained in:
sherlock 2025-10-07 03:32:17 +05:30
parent 9db9ac05ce
commit df44199a02
25 changed files with 544 additions and 0 deletions

View file

@ -0,0 +1,5 @@
# Introduction to Cryptography
Cryptography is the practice and study of techniques for secure communication.
It involves encryption, decryption, and various security protocols.

View file

@ -0,0 +1,5 @@
# Blockchain and Cryptography
Blockchain technology relies heavily on cryptographic hash functions.
Bitcoin and other cryptocurrencies use encryption for security.

View file

@ -0,0 +1,5 @@
# Symmetric Encryption
Symmetric encryption uses the same key for encryption and decryption.
AES is a popular symmetric encryption algorithm used worldwide.

View file

@ -0,0 +1,5 @@
# Asymmetric Encryption
Asymmetric encryption uses a pair of keys: public and private.
RSA and ECC are examples of asymmetric encryption algorithms.

View file

@ -0,0 +1,5 @@
# Hash Functions
Hash functions create fixed-size outputs from variable-size inputs.
SHA-256 and MD5 are commonly used hash functions in cryptography.

View file

@ -0,0 +1,5 @@
# Digital Signatures
Digital signatures provide authentication and non-repudiation.
They use asymmetric encryption to verify the sender's identity.

View file

@ -0,0 +1,5 @@
# Paillier Cryptosystem
Paillier is a probabilistic asymmetric algorithm for public key cryptography.
It provides homomorphic encryption properties for secure computation.

View file

@ -0,0 +1,5 @@
# Public Key Infrastructure
PKI manages digital certificates and public-key encryption.
It provides a framework for secure communication over networks.

View file

@ -0,0 +1,5 @@
# Cryptographic Protocols
Protocols like TLS and SSL ensure secure communication.
They combine encryption, authentication, and data integrity.

View file

@ -0,0 +1,5 @@
# Quantum Cryptography
Quantum cryptography uses quantum mechanics for secure communication.
It provides theoretically unbreakable encryption using quantum key distribution.