Introduction to Cybersecurity
2. Authentication and Cryptography
2.1. Encryption Basics
Encryption converts readable data into unreadable code to protect it from unauthorized access.
-
Symmetric encryption uses one key for both encryption and decryption.
-
Asymmetric encryption uses a public key to encrypt and a private key to decrypt.
-
Common algorithms: AES, RSA, DES.