× Home Jobs Tools Coding Ground Current Affairs UPSC Notes Online Tutors Whiteboard Net Meeting Tutorix Login Packages Categories Academic Tutorials Big Data & Analytics Computer Programming Computer Science Databases DevOps Digital Marketing Engineering Tutorials Exams Syllabus Famous Monuments GATE Exams Tutorials Latest Technologies Machine Learning Mainframe Development Management Tutorials Mathematics Tutorials Microsoft Technologies Misc tutorials Mobile Development Java Technologies Python Technologies SAP Tutorials Programming Scripts Selected Reading Software Quality Soft Skills Telecom Tutorials UPSC IAS Exams Web Development Sports Tutorials XML Technologies Multi-Language Interview Questions Library Videos Q/A eBooks Login Library Videos eBooks Cryptography Tutorial Cryptography Tutorial Home Origin of Cryptography Modern Cryptography Cryptosystems Attacks On Cryptosystem Traditional Ciphers Modern Symmetric Key Encryption Block Cipher Feistel Block Cipher Data Encryption Standard Triple DES Advanced Encryption Standard Block Cipher Modes of Operation Public Key Encryption Data Integrity in Cryptography Cryptography Hash functions Message Authentication Cryptography Digital signatures Public Key Infrastructure Benefits & Drawbacks Cryptography Useful Resources Cryptography - Quick Guide Cryptography - Discussion Selected Reading UPSC IAS Exams Notes Developer's Best Practices Questions and Answers Effective Resume Writing HR Interview Questions Computer Glossary Who is Who
This tutorial covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption, data integration, message authentication, and digital signatures.
This tutorial is meant for students of computer science who aspire to learn the basics of cryptography. It will be useful for networking professionals as well who would like to incorporate various cryptographic algorithms to ensure secure data communication over their networks.
This tutorial has been prepared with the view to make it useful for almost anyone who is curious about cryptography. A basic knowledge of computer science and a secondary level of mathematics knowledge is sufficient to make the most of this tutorial.
Previous Page Print Page Next Page Advertisements Print Add Notes Bookmark this page Report Error Suggestions Save Close