Data Security & Cryptography
Visual, step-by-step cryptography from Caesar to RSA.
From Caesar ciphers to RSA and AES — understand how encryption works from first principles, with step-by-step visual walkthroughs of each algorithm and an interactive Enigma machine.
Classical ciphersPublic-key cryptographyCryptographic hashingInteractive Enigma machineStep-by-step visualization
0/14
lessons completed
Module 1
Symmetric Encryption
The same key encrypts and decrypts. Explore classical ciphers and the ideas behind modern AES.
Caesar Cipher12m
Vigenère Cipher15m
XOR Encryption15m
AES (Conceptual)20m
0/4 completed
In ProgressModule 2
Asymmetric Encryption
Public key encrypts, private key decrypts. No need to share a secret in advance.
RSA (Conceptual)20m
Diffie-Hellman Key Exchange18m
Hybrid Encryption15m
0/3 completed
In ProgressModule 3
Cryptographic Hashing
One-way functions that produce a fixed-size fingerprint of any input — the backbone of integrity and authentication.
What Is Hashing?12m
MD5 & SHA Conceptually18m
Collision Resistance15m
HMAC15m
0/4 completed
In ProgressModule 4
Bonus: Enigma Machine
Step inside WWII's most famous cipher machine — and learn how it was broken.
Enigma: History & Design10m
Enigma Machine (Interactive)interactive20m
Breaking Enigma: The Bombe18m
0/3 completed
In Progress