• Sagar Ajay Rahalkar


There has always been a need to keep data confidential while at rest and while in transit. So far, there have been various ways and techniques used for keeping data confidential; however, these techniques have become more complex and robust with advancements in computing technology. This chapter introduces key concepts in cryptography along with its practical applications.


Block Cipher Stream Cipher Certificate Authority Plain Text Symmetric Encryption 

Copyright information

© Sagar Ajay Rahalkar 2016

Authors and Affiliations

  • Sagar Ajay Rahalkar
    • 1
  1. 1.PuneIndia

Personalised recommendations