In this chapter, we started with a brief history of encryption in order to establish a context regarding the limited lifespan of cryptographic techniques.
In this chapter, we started with a brief history of encryption in order to establish acontext regarding the limited lifespan of cryptographic techniques.