answersLogoWhite

0


Best Answer

Three methods of cryptography are Substitution (substituting one symbol for another), Transposition (rearranging the order of the characters), and Steganography (hiding the existence of the message).

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

The two techniques are as follows:

1- Symmetric-key Cryptography 2- Asymmetric-key Cryptography

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the two types of cryptography?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are different cryptography algorithms?

There are two types of cryptography algorithms: 1) Public key cryptography 2) Secret key cryptography


What are the types of cryptography?

public key cryptography private key cryptography


What the the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What are the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What is symmetric cryptography?

There are two general types of modern cryptography; symmetric cryptography and asymetric (also known as public key) cryptography. Symetric crypto is where both sides have the same shared encryption key, and that key is used to both encrypt and also decrypt any encrypted information. Symmetric crypto is more efficient (faster) than asymmetric crypto, but asymetric crypto works without having to share a key.


What is cryptography and sequrity?

Cryptography is a technique for secure transmission of messages.


When was Cryptography Research created?

Cryptography Research was created in 1995.


What is Cryptography Research's population?

Cryptography Research's population is 25.


What has the author Ben-Zion Chor written?

Ben-Zion Chor has written: 'Two issues in public key cryptography' -- subject(s): Public key cryptography, Security measures, Telecommunication


What is cipher in cryptography?

Encryption and decryption algorithms are called ciphers in cryptography


What has the author Laurence Dwight Smith written?

Laurence Dwight Smith has written: 'Cryptography' -- subject(s): Ciphers, Cryptography 'Reunion' 'Cryptography, the science of secret writing' -- subject(s): Ciphers, Cryptography


How is cryptography used?

Cryptography is basically the process of hiding information in order to protect the sensitive information, data or message from unknown attacks for any reasons. Cryptography actually consists of two terms encryption and decryption. The process in which message is ciphered or encrypted is known as encryption and the process in which message is deciphered at recipients end is known as decryption. And this whole process is known as cryptography. Public keys and private keys are used in the process of cryptography. Cryptography can be seen as symmetric and asymmetric. In symmetric cryptography same key is used for both encryption and decryption while in asymmetric different keys are used for both encryption and decryption. Today Cryptography is used in various fields like ATM, e-banking, IT security, Maths etc.