What is it and why is it necessary?

Goal of Encryption of Internet Traffic

Related Problem

Encryption Components

Encryption Algorithms


Encryption Algorithm - Input and Output

Encryption Keys

Encryption Key Example

Security and Encryption

Brute Force Attacks and Security

Symmetric Encryption

Symmetric Keys

Advantages of Using Symmetric Encryption

Drawbacks of Using Symmetric Encryption

Problems with Management of Symmetric Keys

Public Key Cryptography as a Solution for Managing Symmetric Keys

Asymmetric Encryption - (Public Key Cryptography)

Asymmetric Key Pairs

Asymmetric Key Uses

Confidentiality Using Asymmetric Key Pairs (Encryption)

Confidentiality Using Asymmetric Key Pairs (Decryption)

Digital Signatures Using Asymmetric Key Pairs (Encryption)

Digital Signatures Using Asymmetric Key Pairs (Decryption)

Real World Usage of Asymmetric Encryption

Speed Comparison - Symmetric vs Asymmetric

Encryption Needs for Confidential Commercial Exchanges


Common Symmetric Key Algorithms

Block Ciphers vs Stream Ciphers

Data Encryption Standard - DES

Cipher Block Chaining (CBC)

Brute Force Attacks against DES

Resources Required to Break DES Key

Triple DES

RC2 and RC5

International Data Encryption Algorithm (IDEA)

Key Lengths and Secure Transactions

Recommendations on Key Lengths