A review of some encryption methodologies and an introduction to a new methodology that may challenge the National Security Agency. 


Encrypting information is not new; it's as old as the Roman Empire and even further back than that. Today the National Security Agency tries to decrypt information from our enemies and even in some cases our allies. There are numerous schemas for encryption. The oldest was just the substitution matrix. One letter was substituted for another. The most popular schema today for commercial encryption is private key public key encryption using the RSA Algorithm. Another popular methodology is using the elliptic curve cryptography.  Before we discuss a new methodology of cryptography to seriously challenge the NSA, let's  talk about Elliptic Cryptography and RSA. Elliptic Key and RSA: Elliptic key encryption utilizes the algebra of elliptic curves as an encryption methodology. Its keys can be shorter and is considered more efficient than RSA using less CPU time to decrypt.  RSA is the most widely used methodology for commercial transactions (I almost....

March 3, 2023
Notify of
1 Comment
Oldest Most Voted
Inline Feedbacks
View all comments
Lizzy Agnes
5 months ago

A great hacker is really worthy of good recommendation , Henry
really help to get all the evidence i needed against my husband and
and i was able to confront him with this details from this great hacker
to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, Henryclarkethicalhacker at gmail com, and you can text, call him on whatsapp him on +12014305865, or +17736092741, 

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.