User:DGC12345/sandbox

'Paragraph: Set the style of your text. For example, make a header or plain paragraph text. You can also use it to offset block quotes. bold'


 * A : Highlight your text, then click here to format it with bold, italics, etc. The “More” options allows you to underline (U), cross-out text ( S ), add code snippets ( { } ), change language keyboards (Aあ), and clear all formatting ( ⃠ ).

Links: Highlight text and push this button to make it a link. The Visual Editor will automatically suggest related Wikipedia articles for that word or phrase. This is a great way to connect your article to more Wikipedia content. You only have to link important words once, usually during the first time they appear. If you want to link to pages outside of Wikipedia (for an “external links” section, for example) click on the “External link” tab.

Cite: The citation tool in the Visual Editor helps format your citations. You can simply paste a DOI or URL, and the Visual Editor will try to sort out all of the fields you need. Be sure to review it, however, and apply missing fields manually (if you know them). You can also add books, journals, news, and websites manually. That opens up a quick guide for inputting your citations. Once you've added a source, you can click the “re-use” tab to cite it again.

Bullets: To add bullet points or a numbered list, click here.

Insert: This tab lets you add media, images, or tables.

Ω: This tab allows you to add special characters, such as those found in non-English words, scientific notation, and a handful of language extensions.


 * 1) Lead Section

In cryptography, encryption is the process of encoding information. citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.433.2037&rep=rep1&type=pdf

This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.433.2037&rep=rep1&type=pdf

Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often utilized in military messaging. Since then, new techniques have emerged and become commonplace in all areas of modern computing. https://www.cs.princeton.edu/~chazelle/courses/BIB/overview-crypto.pdf

Modern encryption schemes utilize the concepts of public key and symmetric key. https://www.cs.princeton.edu/~chazelle/courses/BIB/overview-crypto.pdf Modern encryption techniques are secure because modern computers are inefficient at cracking the encryption. Researchers at NIST suggest that quantum computers threaten current systems with public keys. https://arxiv.org/pdf/1804.00200.pdf