logo
  • Ciphers
  • Applications
  • Challenges
  • Quantum

Image Encryption

This section will show how encrypting images uses a symmetric-key algorithm. This means that the same key is used for both encryption and decryption. The user selects the image they want to encrypt and enters a secret key. The image is then encrypted and the user can download it. To decrypt the image, the user enters the same secret key and the image is restored to its original form.

cube

Password Storage

This section will show how passwords are stored securely. Using a technique called hashing, you will learn why even if someone gains access to the database where passwords are stored, they will not get the password itself. Because deciphering the password will take years using the best computers available.

cube

End-to-end Encryption

This section will show how end-to-end encryption works. This means that the messages are encrypted to the sender’s device and can only be decrypted by the recipient’s device, with a unique key. This ensures that even if someone intercepts the message during transmission, they will not be able to read it without the decryption key.

cube

Feedback

By submitting you will be helping me improve on the content of this project.

Find Me

LinkedInInstagram
GitHubWhatsApp