Newest post

Introduction to Asymmetric Cryptography

Introduction     This is the beginning of asymmetric cryptography for this series of posts, so if you are just now beginning to follow along

Topic Match for You

Introduction     This is the beginning of asymmetric cryptography for this series of posts, so if you are just now beginning …

Introduction     Today we won’t actually learn about any new math concepts or algorithms. Instead, we will build upon what we …

This is a continuation of (AES) The Advanced Encryption Standard [Part 1], so it is highly encouraged to read that post before …

Brief History     In 1997, the National Institute of Standards and Technology (NIST) called to replace the DES. By this time …

Motivation In the next few posts I want to discuss the Advanced Encryption Standard or better known as AES, which is the …

This is a continuation of (DES) The Data Encryption Standard [Part 1], so it is highly encouraged to read that post before …

Introduction     The Data Encryption Standard (DES) was proposed in the early 1970s by IBM, who based the design of the …

If you have not yet read the last post Stream Ciphers, Random Numbers, and the One-Time Pad it is highly recommended you …

Symmetric cryptography is split into two types, stream ciphers, and block ciphers. Stream ciphers encrypt one bit at a time and block …

The shift cipher, or the better-known name the Caesar cipher named after Julius Caesar is one of the simplest encryption techniques. In …

Modular Arithmetic     An important question and one that I kept asking if I should dedicate a post to modular arithmetic …

The Substitution Cipher     We will discuss one of the simplest ciphers, the substitution cipher. This cipher has a lot of …

What is Cryptology? The Oxford Dictionary defines Cryptology as: “the study of codes, or the art of writing and solving them”. When …

Discover new

Modes of Operation for Block Ciphers

Introduction     Today we won’t actually learn about any new math concepts or algorithms. Instead, we will build upon what we have already. Particularly

The Substitution Cipher

The Substitution Cipher     We will discuss one of the simplest ciphers, the substitution cipher. This cipher has a lot of historical relevance being