between two parties.
change the content of data passed between two parties.
commit a particular act.
CHAPTER 21
Ten Algorithms That Are Changing the World
395
Because keeping a secret
when using computers, the history of computer-based
cryptographic algorithms is long and interesting. You can find a list of commonly
used algorithms (both present and historical) at
http://www.cryptographyworld.
com/algo.htm
and
https://www.dwheeler.com/secure-programs/Secure-
Programs-HOWTO/crypto.html
. The guide at
https://www.owasp.org/index.
php/Guide_to_Cryptography
provides additional details on how cryptography
works.
Do'stlaringiz bilan baham: