Articles by Tag #cryptography

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Understanding Secure Communication: Encryption, Hashing, and Certificates

If you're diving into secure communications, you've likely heard terms like encryption, hashing,...

Learn More 50 0Apr 7

Hashing

যখন আপনি কোনো ওয়েবসাইটে নতুন অ্যাকাউন্ট খোলার কথা ভাবেন, তখন আপনাকে ইমেল প্রদান করতে হয় এবং একটি...

Learn More 20 0Jan 23

3.4 Stronger Security Notions (Introduction to Modern Cryptography Jonathan Katz and Yehuda Lindell)

3.4.1 Security for Multiple Encryptions Simple experiment, obviously that This...

Learn More 12 1May 2

Custom Prime-Based Key-Driven Encryption with Modulus Patterns

IF ANYONE HAVE MORE DOUBTS ABOUT SECURITY OF THIS ENCRYPTION METHOD,PLEASE COMMENTS IN THIS...

Learn More 6 0Sep 17

Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

A02: Cryptographic Failures Being a full stack developer, I try my best to make my web...

Learn More 5 0Oct 17

How to Implement Argon2 for Secure Password Hashing in Go

Table of Content Understanding Argon2 Major Benefits from Legacy Algorithms Argon2...

Learn More 5 1Jun 3

I Spent a Weekend Implementing Post-Quantum Cryptography - Here's What I Learned

Last month, our security auditor dropped a bomb during a routine review: "What's your post-quantum...

Learn More 5 1Jun 13

A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

I started watching the second session of the Bootcamp with 0xMilica, and as she predicted, my mind...

Learn More 3 1Oct 7

How RSA Works (for Dummies)

RSA stands for Rivest Shamir Adleman, and it was invented by: Ron Rivest Adi Shamir Leonard...

Learn More 3 1Oct 14

Lithe Crypt: Simplifying Encryption in PHP Applications

Lithe Crypt is a simple encryption and decryption utility for PHP, designed to work with the Lithe...

Learn More 3 0Nov 4 '24

Specter-AAL

🔐 Specter-AAL — Simplicity That Haunts Complexity “Specter-AAL is a haunting reminder...

Learn More 3 0May 20

Quantum Cryptography and Medicine: The Future Is Already Here?

Imagine a world where medicine is so precise that it can predict diseases before they even appear,...

Learn More 2 1Feb 14

Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide

Introduction In this guide, we will explore how to implement AES-256 encryption and...

Learn More 2 0Aug 21

Passwordless: A Password-Free Future, But What Are the Differences?

Passwordless adoption is growing rapidly, driven by the need to improve security and simplify the...

Learn More 2 0Feb 8

How to decrypt broken GCM ciphertext

GCM-encrypted data has an authentication tag that serves as an integrity protection mechanism. It is...

Learn More 2 0Sep 6

How to break stream ciphers with repeating keystreams

Stream ciphers usually generate a keystream from a secret key and other input. The encryption...

Learn More 2 0Feb 15

Exploring Quantum Computing: The Next Frontier in Technology (2025)

Quantum computing is reshaping industries in 2025. Discover breakthroughs, use cases, and challenges of this transformative technology.

Learn More 2 1Jan 9

Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

As part of dev3pack, I yearned for the moment when I could participate in the ZK and Privacy...

Learn More 2 0Oct 3

I got 99 problems, but a breach ain’t one

Ineffable Cryptography: The science behind a new era of cybersecurity The future...

Learn More 1 0Jul 29

Symmetric vs Asymmetric Encryption — Lessons from the Field

One of the trickiest questions in my Security+ exam wasn’t about tools or firewalls — it was about...

Learn More 1 0Jul 28

Quantum Key Distribution (QKD)—The Future of Secure Communication

When Will Quantum Computers Pose a Threat? Currently, quantum computers lack the requisite...

Learn More 1 0Feb 12

Post-Quantum Cryptography 2025: Latest Developments and Why It Matters

image credit- FreePixel Imagine a world where encryption — the invisible shield that protects...

Learn More 1 0Jul 17

Top 15+ Must-Have Resources for CS Theory: Cryptography Explained

Dive into the fascinating world of Cryptography, a cornerstone of Computer Science theory that...

Learn More 1 0Jun 21

Bitflip Attack on CBC: Change of the IV

Given an AES-CBC encrypted ciphertext, it is possible to change the outcome of the decryption in a...

Learn More 1 0Jan 4

What is Cryptanalysis?

Overview of Cryptanalysis Cryptanalysis is the process that involves analyzing...

Learn More 1 0Apr 30

🔐 Are Your Passwords Ready for the Quantum Age?

In today’s digital landscape, strong passwords and encryption are the backbone of online security....

Learn More 1 0Jun 16

Quantum Cryptography and Post-Quantum Security Challenges

# Quantum Cryptography and Post-Quantum Security Challenges ## Introduction Quantum computing advances threaten current cryptographic standards, nec...

Learn More 1 0Aug 11

🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know “The next war won’t...

Learn More 1 0Aug 13

CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

I’m a self-taught cryptography enthusiast and high school graduate who loves exploring the...

Learn More 1 0Aug 2

Cryptographic Implementation Flaws: Modern Encryption Analysis

Cryptographic Implementation Flaws: Modern Encryption Analysis ...

Learn More 1 0Aug 10