# Cryptography Algorithms

In general, there are three types of cryptography algorithms:

- Symmetric Key Cryptography: It involves a single key that is used for both encryption and decryption.
- Asymmetric Key Cryptography: It uses a pair of two different keys, one used for encryption and the other for decryption.
- Hash Function: A hash function is a one-way mathematical function that is used to produce a unique hash value from original data. The hash function is not reversible which means that the original data cannot be reconstituted from the hash value even with the knowledge of the hash function. The hash value is usually appended to the original message as the unique identifier of the message like a fingerprint.

In Figure 12-2, we present a very simple encryption algorithm known as the Caesar cipher. This method is named after Julius Caesar, who used it to encrypt his private correspondence. Each alphabet is shifted right or left by a fixed number of positions. The number of positions and the direction of shift must be known to both the sender and receiver in order to encrypt and decrypt the message.

Caesar cipher with a left shift of three positions looks like this:

- Plaintext: ABCD EFGH IJKL MNOP QRST UVWX YZ
- Ciphertext: XYZA BCDE FGHI JKLM NOPQ RSTU VW

Figure 12-2 Encryption Process

Please keep in mind that today’s encryption algorithms are way more complex than the Caesar cipher and involve complicated mathematical computations that can be performed only by computers. However, the basic principle of encryption is still the same.

I like what you guys are up too. This type of clever work and reporting!

Keep up the very good works guys I’ve incorporated you guys to my blogroll.

Just want to say your article is as astonishing. The

clearness for your put up is just cool and i can think you

are a professional on this subject. Well with your permission allow me to clutch your

feed to stay updated with drawing close post. Thanks one million and please keep up the rewarding work.

I know this if off topic but I’m looking into starting my own blog and was wondering what all is needed to get set up?

I’m assuming having a blog like yours would cost a pretty

penny? I’m not very web smart so I’m not 100% positive.

Any recommendations or advice would be greatly appreciated.

Thank you

Its like you learn my thoughts! You appear to understand a lot about

this, such as you wrote the e book in it or something. I feel that you simply could

do with some p.c. to power the message home a bit, but instead of that, this is excellent blog.

An excellent read. I’ll definitely be back.

Heya! I just wanted to ask if you ever have any problems with

hackers? My last blog (wordpress) was hacked and I ended up losing several weeks of hard work due to no

backup. Do you have any methods to prevent hackers?

hey there and thank you for your info ? I have definitely picked up anything new from right here.

I did however expertise some technical issues using this

web site, as I experienced to reload the website lots of times previous

to I could get it to load correctly. I had been wondering if your web host is OK?

Not that I’m complaining, but sluggish loading instances times will often affect your placement

in google and can damage your high quality score if ads and marketing with Adwords.

Well I’m adding this RSS to my email and could look out for much more of

your respective interesting content. Make sure you update this again soon.

I wish to point out my appreciation for your kind-heartedness supporting individuals who

really need assistance with this subject. Your personal

dedication to passing the message up and down appears to be exceedingly practical

and have really empowered girls just like me to

reach their dreams. Your insightful tips and hints denotes so

much a person like me and a whole lot more to my colleagues.

Many thanks; from everyone of us.

Your means of telling the whole thing in this article

is actually fastidious, all can simply be aware of it,

Thanks a lot.