schedule

Reset Schedule: 00:00 & 12:00 (GMT+7) Daily

lock

Encryption Visualizer

Visualize encryption algorithms and cryptography concepts for data security testing

Interactive Encryption Demonstration

Explore different encryption algorithms and see how they work.

Understanding Encryption

enhanced_encryption

Symmetric Encryption

Uses the same key for both encryption and decryption processes.

  • • Fast processing speed
  • • Simple key management
  • • Common algorithms: AES, DES, 3DES
  • • Used for bulk data encryption
key

Asymmetric Encryption

Uses different keys for encryption (public) and decryption (private).

  • • Enhanced security model
  • • Digital signatures support
  • • Common algorithms: RSA, ECC, DSA
  • • Used for secure key exchange

Algorithm Demonstrations

Caesar Cipher

Original:  HELLO WORLD
Shift:     3 positions
Encrypted: KHOOR ZRUOG

Process:
H (7) + 3 = K (10)
E (4) + 3 = H (7)
L (11) + 3 = O (14)
L (11) + 3 = O (14)
O (14) + 3 = R (17)

Base64 Encoding

Original:  Hello
ASCII:     72 101 108 108 111
Binary:    01001000 01100101 01101100 01101100 01101111
Base64:    SGVsbG8=

Process:
1. Convert to ASCII bytes
2. Convert to binary
3. Group into 6-bit chunks
4. Map to Base64 characters