• Sagar Ajay Rahalkar


There has always been a need to keep data confidential while at rest and while in transit. So far, there have been various ways and techniques used for keeping data confidential; however, these techniques have become more complex and robust with advancements in computing technology. This chapter introduces key concepts in cryptography along with its practical applications.


Block Cipher Stream Cipher Certificate Authority Plain Text Symmetric Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Sagar Ajay Rahalkar 2016

Authors and Affiliations

  • Sagar Ajay Rahalkar
    • 1
  1. 1.PuneIndia

Personalised recommendations