Today we've covered some of the important concepts in cryptography. First, we established the methods of encryption, which in principle is enciphering and deciphering. Then we moved on to discuss different types of encryption. In essence, the encryption types are either symmetric or asymmetric. We've also covered example algorithms under each of these types.
We've dealt with public key cryptography, which is a type of asymmetric key encryption, and seen that digital signatures are its main application. We've also reviewed the function of hashing, its purpose, and the different hashing algorithms.
Finally, we've dealt with the application and use of cryptography in various day-to-day IT related activities. These activities include web browsing, email, or messaging, and also the area of wired or wireless networking.
Tomorrow we'll focus on the most important application of cryptography, which is Public Key Infrastructure. It uses the concepts of public key cryptography and key management...