answersLogoWhite

0

Yes, the basic underlying concept is still same . First encryption is done and then to decode the original text decryption is done..

User Avatar

Wiki User

10y ago

What else can I help you with?

Related Questions

What is a cryptolgist?

The study of cryptanalysis or cryptography. Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce


What are the types of cryptography?

public key cryptography private key cryptography


What are different cryptography algorithms?

There are two types of cryptography algorithms: 1) Public key cryptography 2) Secret key cryptography


What are the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What the the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What is cryptography and sequrity?

Cryptography is a technique for secure transmission of messages.


When was Cryptography Research created?

Cryptography Research was created in 1995.


What is Cryptography Research's population?

Cryptography Research's population is 25.


What is cipher in cryptography?

Encryption and decryption algorithms are called ciphers in cryptography


People who inherit old money are called what?

People that inherit old money are called heirs and heiresses. It is an old term used to describe people with large amounts of inherited money.


What has the author Laurence Dwight Smith written?

Laurence Dwight Smith has written: 'Cryptography' -- subject(s): Ciphers, Cryptography 'Reunion' 'Cryptography, the science of secret writing' -- subject(s): Ciphers, Cryptography


What is the introduction of Cryptography?

Cryptography is the science of transforming messages to make them secure and immune to attack.