O'Reilly logo

Python for Offensive PenTest by Hussam Khrais

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction to encryption algorithms

In this section, we'll have a quick overview of the most common encryption algorithms in the cryptography world. Basically, there are two types of encryption algorithms. The first one is called symmetric and the second one is called asymmetric. Now, this classification is made based on the number of needed keys and how they are operated. Let's discuss the difference between these algorithms a little bit, and we will start with the symmetric one.

Now, symmetric encryption uses one key for both the encryption and the decryption process and this key is shared on both the client and the server side. Now, the most common examples of symmetric encryption are AES, Blowfish, RC4, and Triple DES. In asymmetric ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required