© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
H. ZhouMastering Excel Through Projectshttps://doi.org/10.1007/978-1-4842-7842-0_4

4. Public and Private Key Cryptography

Hong Zhou1  
(1)
University of Saint Joseph, West Hartford, CT, USA
 

Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.

Encryption techniques have been around for thousands of years. In today’s digital world, encryption has become more sophisticated and challenging as the digital world is facing various malicious and smart hackers. To encrypt a digital message, we use a key (e.g., a password) to turn the message into a bit array via a specific algorithm or process, ...

Get Mastering Excel Through Projects: A Learn-by-Doing Approach from Payroll to Crypto to Data Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.