Articles by Tag #cryptography

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

I started watching the second session of the Bootcamp with 0xMilica, and as she predicted, my mind...

Learn More 3 1Oct 7 '25

Understanding Secure Communication: Encryption, Hashing, and Certificates

If you're diving into secure communications, you've likely heard terms like encryption, hashing,...

Learn More 50 0Apr 7 '25

Secure Remote Password (SRP) protocol

Introduction In this article, I’ll walk you through my implementation of the Secure Remote...

Learn More 2 0Oct 28 '25

Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

Every website deals with the same problem: bots crawling your site, and absolutely no reliable way to...

Learn More 4 0Nov 5 '25

Getting Started with eslint-plugin-crypto

Cryptography security in 60 seconds. 24 rules for weak algorithms, random generation, and key management.

Learn More 0 0Jan 2

(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

Welcome back to the Confidential Computing Chronicles. In Part 4, we learned how to prove our...

Learn More 1 1Dec 31 '25

Multiplication in Galois fields with the xtimes function

In my previous post, I wrote about finite fields (Galois fields) of order 2n, abbreviated GF(2n)....

Learn More 0 0Jan 4

Finite Fields: The Hidden Math Powering Blockchains

Week 1: Finite Field Elements: the math quietly powering blockchains A few weeks ago, I...

Learn More 0 0Jan 1

Protecting Sensitive Data Using Envelope Encryption

Envelope encryption is a technique that uses two layers of encryption to protect sensitive data. The...

Learn More 0 0Dec 30 '25

How to implement GHASH

GHASH is the hash function that GCM uses to compute authentication tags. It is defined in NIST's GCM...

Learn More 0 0Dec 30 '25

Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge

How I built TimeSeal using split-key cryptography, edge computing, and zero-trust architecture to create mathematically unbreakable time locks

Learn More 0 0Dec 27 '25

The EU AI Act Doesn't Mandate Cryptographic Logs—But You'll Want Them Anyway

How Articles 12, 15, and 73 create implicit pressure for tamper-evident audit trails in high-risk AI...

Learn More 0 0Dec 25 '25

Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

The SEC's 2022 amendments to Rule 17a-4 introduced an "audit-trail alternative" to traditional WORM...

Learn More 0 0Dec 24 '25

The VeritasChain Protocol: A Cryptographic Audit Standard for the Algorithmic Trading Era

The global financial system has crossed a threshold. For the first time in history, algorithms—not...

Learn More 0 1Dec 7 '25

AES Algorithm for beginners

AES is a symmetric-key encryption algorithm that is considered extremely secure, very easy to...

Learn More 0 0Nov 30 '25

AIDE in Motion Automating and Signing System Integrity Checks

Proving System Integrity with GPG Signatures and Cryptographic Verification of AIDE Baselines and Reports

Learn More 0 0Nov 30 '25

Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

From the first whispered secret you tried to pass in school to the last password you sent over a chat...

Learn More 0 0Nov 11 '25

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

NIST finalized post-quantum standards in 2024. Here's how to pick the right algorithm for your stack and why hybrid mode isn't optional.

Learn More 0 0Nov 9 '25

Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

A02: Cryptographic Failures Being a full stack developer, I try my best to make my web...

Learn More 7 0Oct 17 '25

How RSA Works (for Dummies)

RSA stands for Rivest Shamir Adleman, and it was invented by: Ron Rivest Adi Shamir Leonard...

Learn More 0 2Oct 14 '25

Building Tamper-Evident Audit Trails for Algorithmic Trading: A Developer's Guide

The EU AI Act (Regulation 2024/1689) requires high-risk AI systems to maintain automatic logging...

Learn More 0 0Dec 30 '25

Cryptography for developers

🔐 The Invisible Backbone of the Digital World I’d dare to say that cryptography is the backbone of...

Learn More 2 0Oct 29 '25

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

In 2025, privacy-first communication is no longer a luxury — it’s a necessity. Decentralized,...

Learn More 0 0Oct 30 '25

Beyond the Wire: Encrypting Messages Where the Message Never Exists

¡Esa es una idea fantástica para un artículo! El concepto de que el mensaje es la diferencia entre...

Learn More 0 0Dec 16 '25

npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

As developers, we are obsessed with code quality. We run linters, we do static analysis, and we patch...

Learn More 0 1Dec 18 '25

Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

A common criticism of blockchain-based audit systems: "You can't have immutable logs AND GDPR...

Learn More 0 0Dec 8 '25

CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

When AI art collides with military-grade encryption, you don’t just build an app — you summon a...

Learn More 0 0Dec 5 '25

Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Quantum Illusions: Can We Really Trust Our Entanglement Tests? Imagine building a...

Learn More 0 0Dec 5 '25

Announcing securebit_core: A Platform-Agnostic Cryptographic Kernel for Secure P2P Communication

Today, I'm excited to announce the public release of securebit_core — a pure Rust cryptographic...

Learn More 0 0Dec 23 '25

Bracing for Breakers: Quantum-Safe Crypto for the Real World

Bracing for Breakers: Quantum-Safe Crypto for the Real World Imagine all your HTTPS...

Learn More 0 0Oct 29 '25