2. Authentication and Cryptography

2.1. Encryption Basics

Encryption converts readable data into unreadable code to protect it from unauthorized access.

  • Symmetric encryption uses one key for both encryption and decryption.

  • Asymmetric encryption uses a public key to encrypt and a private key to decrypt.

  • Common algorithms: AES, RSA, DES.