(15/10/23) Blog 288 – Encryption – a short guide (pt2)
In the previous post, I identified a few common terms used in encryption, and then identified some early examples of ancient encryption . In those early methods of securing data, we see three more fundamental encryption terms being used. Transposition, Substitution, and the use of a key. Lets take a […]
Continue Reading