Asymmetric and Symmetric Encryption

A couple weeks ago I was reading and experimenting with OAuth 2.0. I have been learning (it is a never ending task) and using encryption for at least a couple decades. Have developed some hashing algorithms to hash software licenses, but have never attempted to develop a full encryption algorithm. Continue reading “Asymmetric and Symmetric Encryption”