Biar pfp
Biar

@biar

In fact, you encounter these concepts daily: ‎•WhatsApp shows “end-to-end encryption” when you open a chat. ‎•When you enter a store, your data is encrypted. ‎•Even your passwords are stored in encrypted data repositories. ‎So, let’s go step by step through encryption methods. Starting with symmetric encryption. ‎Symmetric Encryption ‎In symmetric encryption, the same key is used both to encrypt data and to decrypt it again. ‎This method can be advantageous because it’s fast. However, it has vulnerabilities, mainly around key distribution. Safely sending the key to the other party can be just as challenging as transmitting the encrypted message itself. ‎The key idea here: there is only one key, and it must be securely delivered to the person you want to access the message.
1 reply
0 recast
0 reaction