Introduction (Seeing Cryptography From Bird eye's view)

Untitled

Symmetric Encryption

The Problem

if the message is carried in its original form from , Alice to Bob , the message could have been leaked or accessed by another person , who shouldn't have had access to the data

The Solution

The Evolution and the Kerckhoff's Principle

When is the cryptographic Algorithm considered to be broken