Tag: Encryption in Uganda
-
HOW TO CREATE PUBLIC AND PRIVATE KEYS FOR ENCRYPTING AND DECRYPTING EMAIL MESSAGES
In the previous week, I made a video that takes you through the steps of encrypting and decrypting emails and now i just want to note down the steps right here. You should be able to watch the video through the link below Asymmetric encryption also referred to as public key cryptography uses public key…
-
EXPLAINING SYMMETRIC AND ASYMMETRIC ENCRYPTION
Every organization has one way of encrypting and decripting data, the choice sometimes depends on the flexibility of the encryption method. A bank may choose both asymmetric and symmetric encryption depending on the convenience of the situation. While using the ATM card system, banks use symmetric encryption because it is faster and convenient. Remember so…