You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
👍 Nice work! You have proven that you are a qualified "Agent with PHP and Encryption Experience". You have gained valuable experience both in building and in using encryption tools.
Key points to review and remember:
Symmetric key algorithms
"password encryption"
fast, can handle large amounts of data
the key or password must be shared secretly somehow
Asymmetric key algorithms
"public-private keys"
slow, can only handle small amounts of data
public key can be shared openly
Checksum/Hash
Works because same function inputs = same output
Used to verify data integrity
Digital Signature
Checksum with a public/private key added
Used to verify data integrity + authenticity
If you would like to learn more about code and cryptography, "The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography" by Simon Singh is an excellent book on both the history and techniques.
Hello Jeremy,
👍 Nice work! You have proven that you are a qualified "Agent with PHP and Encryption Experience". You have gained valuable experience both in building and in using encryption tools.
Key points to review and remember:
If you would like to learn more about code and cryptography, "The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography" by Simon Singh is an excellent book on both the history and techniques.
If you have any particular questions about the assignment or the feedback, email us at universitysupport@codepath.com.
The text was updated successfully, but these errors were encountered: