This assignment is a report style assessment based on the encryption methods studied during the module.
encrypt and decrypt data by a variety of methods
carry out various cryptographic protocols;
explain the strengths, weaknesses and underlying theory of the various methods and protocols
hi i can do this
...................................................................................................................................................................................