<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>ritik5049</title>
    <link>https://blogs.dgplug.org/ritik5049/</link>
    <description></description>
    <pubDate>Sat, 04 Apr 2026 06:25:29 +0000</pubDate>
    <item>
      <title>Types of Encryption</title>
      <link>https://blogs.dgplug.org/ritik5049/types-of-encryption</link>
      <description>&lt;![CDATA[Nowdays these two types of encryption methods are widely used.&#xA;Symmetric encryption&#xA;Asymmetric encryption&#xA;&#xA;Symmetric Encryption&#xA;In symmetric encryption single key is used by both sender and receiver for encryption and decryption. Therefore both the parties have to exchange the key and thus trust issues arise here a lot. Some of symmetric key algorithms are  DES(Data Encryption Standard), Triple DES, AES(Advanced Encryption Standard).&#xA;&#xA;symmetric&#xA;&#xA;Suppose there are two-person A and B, A wants to send his/her data from an insecure network to B. A will encrypt the data with key and B will have to decrypt it with the same key.&#xA;&#xA;Asymmetric Encryption&#xA;In asymmetric encryption pair of the key are used, one is called public key and the other is private key. The private key is kept secret by the owner and the public key is shared. Data encrypted with the recipient&#39;s public key can only be decrypted by the corresponding private key.&#xA;&#xA;asymmetric &#xA;&#xA;Suppose A wants to send data to B, so A must have B&#39;s public key to encrypt the data then B decrypt the same with his/her corresponding private key.]]&gt;</description>
      <content:encoded><![CDATA[<p>Nowdays these two types of encryption methods are widely used.
* <a href="https://en.wikipedia.org/wiki/Symmetric-key_algorithm" rel="nofollow">Symmetric encryption</a>
* <a href="https://en.wikipedia.org/wiki/Public-key_cryptography" rel="nofollow">Asymmetric encryption</a></p>

<h3 id="symmetric-encryption">Symmetric Encryption</h3>

<p>In symmetric encryption single key is used by both sender and receiver for encryption and decryption. Therefore both the parties have to exchange the key and thus trust issues arise here a lot. Some of symmetric key algorithms are  <a href="https://en.wikipedia.org/wiki/Data_Encryption_Standard" rel="nofollow">DES</a>(Data Encryption Standard), <a href="https://simple.wikipedia.org/wiki/Triple_DES" rel="nofollow">Triple DES</a>, <a href="https://en.wikipedia.org/wiki/Advanced_Encryption_Standard" rel="nofollow">AES</a>(Advanced Encryption Standard).</p>

<p><img src="https://ico.org.uk/media/images/other/2260256/symmetric.gif" alt="symmetric"></p>

<p>Suppose there are two-person A and B, A wants to send his/her data from an insecure network to B. A will encrypt the data with key and B will have to decrypt it with the same key.</p>

<h3 id="asymmetric-encryption">Asymmetric Encryption</h3>

<p>In asymmetric encryption pair of the key are used, one is called <a href="https://en.wikipedia.org/wiki/Public-key_cryptography" rel="nofollow">public key</a> and the other is <a href="https://koolspan.com/private-key-encryption/" rel="nofollow">private key</a>. The private key is kept secret by the owner and the public key is shared. Data encrypted with the recipient&#39;s public key can only be decrypted by the corresponding private key.</p>

<p><img src="https://ico.org.uk/media/images/other/2260261/asymmetric.gif" alt="asymmetric"></p>

<p>Suppose A wants to send data to B, so A must have B&#39;s public key to encrypt the data then B decrypt the same with his/her corresponding private key.</p>
]]></content:encoded>
      <guid>https://blogs.dgplug.org/ritik5049/types-of-encryption</guid>
      <pubDate>Sun, 14 Jul 2019 18:43:03 +0000</pubDate>
    </item>
    <item>
      <title>Hey everyone if you want to view information about CPU in Linux you can use the...</title>
      <link>https://blogs.dgplug.org/ritik5049/hey-everyone-if-you-want-to-view-information-about-cpu-in-linux-you-can-use-the</link>
      <description>&lt;![CDATA[Hey everyone if you want to view information about CPU in Linux you can use the command cat /proc/cpuinfo in terminal it will display what type of processor your system is running and the number of CPUs present and much more.&#xA;Here is an example.&#xA;cpuinfo]]&gt;</description>
      <content:encoded><![CDATA[<p>Hey everyone if you want to view information about CPU in Linux you can use the command <code>cat /proc/cpuinfo</code> in terminal it will display what type of processor your system is running and the number of CPUs present and much more.
Here is an example.
<img src="http://sirlagz.net/wp-content/uploads/2016/10/proc-cpu.png" alt="cpuinfo"></p>
]]></content:encoded>
      <guid>https://blogs.dgplug.org/ritik5049/hey-everyone-if-you-want-to-view-information-about-cpu-in-linux-you-can-use-the</guid>
      <pubDate>Wed, 10 Jul 2019 16:59:26 +0000</pubDate>
    </item>
    <item>
      <title>My first blog ever</title>
      <link>https://blogs.dgplug.org/ritik5049/my-first-blog-ever</link>
      <description>&lt;![CDATA[Hello folks, my self Ritik Raushan. This is my first blog ever written by me. I`ll be going to publish much more technical kinds of stuff in upcoming posts. &#xA;Here we will learn and grow together. See you again.&#xA;  ]]&gt;</description>
      <content:encoded><![CDATA[<p>Hello folks, my self Ritik Raushan. This is my first blog ever written by me. I`ll be going to publish much more technical kinds of stuff in upcoming posts.
Here we will learn and grow together. See you again.</p>
]]></content:encoded>
      <guid>https://blogs.dgplug.org/ritik5049/my-first-blog-ever</guid>
      <pubDate>Sun, 07 Jul 2019 20:05:01 +0000</pubDate>
    </item>
  </channel>
</rss>