Cryptography (8)

How Practical is Homomorphic Encryption?

Homomorphic encryption is a cybersecurity technique where data can be encrypted and then run through a mathematical transformation without being decrypted. This means that only the owner of the encryption key has access to the data.

Keep Your Secrets Safe With Cryptography and Steganography

There are different kind of forms of covert communication that involve the use of any medium to hide something. Cryptography and steganography are often used together to conceal crucial data. Both have nearly the same aim at their heart, which is to safeguard a message or information from third parties. They do, however, safeguard the information via a completely different approach.

Introduction to RSA encryption

Asymmetric encryption is possible using RSA, which is an acronym of the authors’ names (Rivest–Shamir–Adleman). Asymmetric cryptosystems are sometimes known as “public-key cryptography,” since they employ a public key to encrypt data and only a hidden, private key to decode it. For security considerations, a code is appended to the standard message in this algorithm. The approach is based on huge number factorization. Because vast numbers are hard to ascertain, getting into the text for invaders is challenging. We’ll go through the basics of how the RSA algorithm works in this blog.

Hashing Algorithms: The Quick and Easy Way to Verify Integrity and Authentication

We need an algorithm to encrypt and decrypt information. So, what is an algorithm? They are just arithmetic methods of converting data into an unreadable format. In this blog, we are going to provide an introduction to hashes which are also coined as message digests algorithms (MD).

Hands-on with Hash Functions

In this blog we are going to cover hash functions, most popular algorithms used in modern appliances and make a quick excercise to solidify our technical skills by comparing SHA256 hashes of two identical and slightly modified .txt files. Let’s start with a broad look on digital signatures.

Hands On with Public Key Cryptography

In this blog post, we are going to introduce public-key cryptography, in which you have two keys to hide and write data, and we will look at applications, benefits, and drawbacks. Finally, in the last section, we will do an exercise to apply cryptographic skills to a passion project.

Hands-on with shared key encryption

Shared key encryption is a type of encryption where the key is shared between the sender and receiver of the data. This means that both parties have access to the same key, which is used to encrypt and decrypt the data. This type of encryption is often used in communication between two parties who know each other. In this article, we are going to discuss private key encryption, types of ciphers, and examples of encryption systems. We will also talk about security on shared-key algorithms and finally make a quick hands-on activity to apply the information for a solid understanding.

Introduction to Cryptography and Block Cipher Modes

Cryptography is the science of encrypting sensitive information into an unreadable format so that it can only be viewed by intended recipients. Messages such as sensitive state secrets or communication between military groups have been delivered using cryptographic methods throughout history. With rapid development in the field of computer science, cryptographic techniques have evolved over time to ensure safe data transfer.