You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,15 @@ I recently learned about cryptography and several encryption and decryption algo
11
11
-[Asymmetric Encryption](#asymmetric-encryption)
12
12
-[Hashing](#hashing)
13
13
-[Decryption](#decryption)
14
+
*[Installation](#installation)
15
+
*[Encryption](#encryption)
16
+
-[Algorithm](#algorithm)
17
+
-[Python code](#python-code)
18
+
*[Decryption](#decryption)
19
+
-[Algorithm](#algorithm)
20
+
-[Python code](#python-code)
21
+
*[Conclusion](#conclusion)
22
+
*[Contribution](#contribution)
14
23
15
24
## Cryptography
16
25
@@ -43,4 +52,9 @@ Hashing generates a unique signature of fixed length for a data set or message.
43
52
Decryption is a process of decoding the encoded data. Converting the ciphertext into plain text. This process requires a key that we used for encryption.
0 commit comments