Tag: Encryption in Uganda

  • HOW TO CREATE PUBLIC AND PRIVATE KEYS FOR ENCRYPTING AND DECRYPTING EMAIL MESSAGES

    HOW TO CREATE PUBLIC AND PRIVATE KEYS FOR ENCRYPTING AND DECRYPTING EMAIL MESSAGES

    In the previous week, I made a video that takes you through the steps of encrypting and decrypting emails and now i just want to note down the steps right here. You should be able to watch the video through the link below Asymmetric encryption also referred to as public key cryptography uses public key…

  • EXPLAINING SYMMETRIC AND ASYMMETRIC ENCRYPTION

    EXPLAINING SYMMETRIC AND ASYMMETRIC ENCRYPTION

    Every organization has one way of encrypting and decripting data, the choice sometimes depends on the flexibility of the encryption method. A bank may choose both asymmetric and symmetric encryption depending on the convenience of the situation. While using the ATM card system, banks use symmetric encryption because it is faster and convenient. Remember so…

Follow us on Social Media

Enjoy this blog? Please spread the word :)