- Symmetric Cryptography: This type of cryptography uses a single secret key for both
encrypting and decrypting the data. Examples of symmetric algorithms include AES,
DES, and Blowfish. - Asymmetric Cryptography: This type of cryptography uses a pair of keys, a public
key and a private key, for encrypting and decrypting the data. Examples of
asymmetric algorithms include RSA, Elliptic Curve Cryptography (ECC), and Diffie-
Hellman. - Hash functions: This type of cryptography is used for data integrity and
authentication. It takes input data and produces a fixed-size output, called a hash or
digest. Examples of hash functions include SHA-256, SHA-1, and MD5. - Steganography: This is the practice of hiding data within other data, such as hiding a
message within an image or audio file. - Quantum Cryptography: This is a form of cryptography that uses the principles of
quantum mechanics to secure communication. It is considered to be more secure than
traditional forms of cryptography as it is resistant to certain types of attacks, such as
the man-in-the-middle attack.
Reference:
● Wikipedia: https://en.wikipedia.org/wiki/Cryptography
● NIST: https://csrc.nist.gov/Projects/cryptographic-standards-and-guidelines
● Schneier on Security: https://www.schneier.com/
● IEEE: https://www.ieee.org/security/
● Crypto-IT: https://crypto-it.net/