Skip to main content

All Questions

0votes
1answer
1kviews

Encryption Algorithm With Separate One-Way (Hashing) And Two-Way (Decryption) Keys

In cryptography, generally we have two ways of handling sensitive information. We can use one-way encryption such as hashing. This is useful when we never need to retrieve it again. In this case, we ...
azoundria's user avatar
1vote
1answer
1kviews

How to decrypt a text with substitution cipher? [closed]

I recently got a file which I had encrypted with substitution cipher a long time ago. I went to crack down the key and almost got it. But I encrypted it not just with alphabets but also with numbers ...
remedcu's user avatar

close