Cryptography November 25, 2020 Howard Poston Decrypting Downloaded Files Malware authors commonly design their malware to communicate with their operators. In some cases, these command and control (C2) channels are designed to...
Cryptography November 23, 2020 Nitesh Malviya Introduction to hash functions Hash functions are the most commonly used mathematical functions in cryptography for implementing security. A hash function converts an input value of any arbitrary...
Cryptography November 23, 2020 Nitesh Malviya Introduction to Asymmetric Cryptography Cryptography uses symmetric and asymmetric encryption for encryption and decryption of data. In this post, we will be focusing on and discussing asymmetric...
Cryptography November 23, 2020 Nitesh Malviya The Advanced Encryption Standard (AES) Advanced Encryption Standard short formed as AES falls under the symmetric encryption category. Thus, in AES the sender and the recipient of the data uses...
Cryptography November 23, 2020 Nitesh Malviya Fundamentals of symmetric and asymmetric cryptography Cryptography uses symmetric and asymmetric encryption for encryption and decryption of data. If the sender and the recipient of the data use the same key to...
Cryptography October 20, 2020 Dimitar Kostadinov Case Studies in Poor Password Management In essence, a password is a cryptographic secret that needs proper storage and management. Even for individual users this can be a difficult task, however,...
Cryptography October 13, 2020 Jatin Jain The ultimate guide to encryption key management In cryptography, a key is a very important piece of information used to combine with an algorithm (a cipher) to transform plaintext into ciphertext (encryption). The...
Cryptography October 8, 2020 Dan Virgillito Principles of cryptography In layman’s terms, cryptography is the encryption and decryption of a written or text message between two parties. The practice relies on ciphers — a set...
Cryptography September 23, 2020 Nitesh Malviya Encryption vs Encoding Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data...
Cryptography August 31, 2020 Howard Poston Introduction to Cryptanalysis Cryptography is the science of creating codes or keeping this secret. Cryptanalysis is the opposite: the attempt to break the code, gaining unauthorized access...