Introduction This is the beginning of asymmetric cryptography for this series of posts, so if you are just now beginning to follow along
Introduction This is the beginning of asymmetric cryptography for this series of posts, so if you are just now beginning …
Introduction Today we won’t actually learn about any new math concepts or algorithms. Instead, we will build upon what we …
This is a continuation of (AES) The Advanced Encryption Standard [Part 1], so it is highly encouraged to read that post before …
Brief History In 1997, the National Institute of Standards and Technology (NIST) called to replace the DES. By this time …
Motivation In the next few posts I want to discuss the Advanced Encryption Standard or better known as AES, which is the …
This is a continuation of (DES) The Data Encryption Standard [Part 1], so it is highly encouraged to read that post before …
Introduction The Data Encryption Standard (DES) was proposed in the early 1970s by IBM, who based the design of the …
If you have not yet read the last post Stream Ciphers, Random Numbers, and the One-Time Pad it is highly recommended you …
Symmetric cryptography is split into two types, stream ciphers, and block ciphers. Stream ciphers encrypt one bit at a time and block …
The shift cipher, or the better-known name the Caesar cipher named after Julius Caesar is one of the simplest encryption techniques. In …
Modular Arithmetic An important question and one that I kept asking if I should dedicate a post to modular arithmetic …
The Substitution Cipher We will discuss one of the simplest ciphers, the substitution cipher. This cipher has a lot of …
What is Cryptology? The Oxford Dictionary defines Cryptology as: “the study of codes, or the art of writing and solving them”. When …
Motivation In the next few posts I want to discuss the Advanced Encryption Standard or better known as AES, which is the most famous symmetric
Brief History In 1997, the National Institute of Standards and Technology (NIST) called to replace the DES. By this time DES was considered
Introduction Today we won’t actually learn about any new math concepts or algorithms. Instead, we will build upon what we have already. Particularly
The Substitution Cipher We will discuss one of the simplest ciphers, the substitution cipher. This cipher has a lot of historical relevance being
This is a continuation of (AES) The Advanced Encryption Standard [Part 1], so it is highly encouraged to read that post before reading this post.
This is a continuation of (DES) The Data Encryption Standard [Part 1], so it is highly encouraged to read that post before reading this post.