2. Symmetric and Asymmetric Cryptographic Algorithms Notes | Information Security BIM | TU | TABFlux