Encryption, has travelled a long way, crossed many boundaries, and navigated through many seas, from the times when it was used to conceal information carved onto rocks, to now being used to conceal everything from top secret documents of importance to National Security to your 6 year old sibling's emails to her pen pal in china! Born out of the mélange of mathematical concepts, computational technology and pure human intellect, these encryption algorithms have been seamlessly architected by cryptographers in the modern world.
Yet, the significance of these algorithms is overlooked upon by the bigger half of the public, as they are available at the mere click of a mouse. Based on the concepts of symmetric and asymmetric key cryptography, these are the algorithms that have made you and me feel so much safer.
Read more to explore the background details as well as the technical details behind each of the groundbreaking algorithms.