This is an article in a series on Cryptography for the Everyday Developer. Follow along to learn the basics of modern cryptography and encryption. The Data Encryption Standard (DES) is based upon the principles of a substitution-permutation network that we learned about in the last post in this series. The design of DES is based on the principles of Feistel ciphers, which are a particular configuration of a substitution-permutation network developed by Horst Feistel at IBM.| Kevin Sookocheff
Twofish is the successor to Blowfish and was a finalist in the National Institute of Technology and Science's (NIST's) search for an algorithm to replace DES.| Encryption Consulting
Encryption and hashing are very similar types of data manipulation, but they are used for different types of use cases. Read on to learn the difference!| Encryption Consulting
The major difference between the two types of encryption is, symmetric encryption uses 1 key, whereas asymmetric encryption uses 2 keys for data transfer.| Encryption Consulting