Tag Archives: cryptography

Encryption and hashing are the two terms used widely in cryptography. In this article, we will learn what is the difference between encryption and hashing.… Read More
Encryption and  Encoding are the terms commonly interchanged and used incorrectly. There is a lot of difference between these two terms and it is very… Read More
This algorithm is used to maintain the causal ordering of the messages i.e. the message which is sent first should be received first. If send… Read More
Digital Signature : As the name sounds are the new alternative to sign a document digitally. It ensures that the message is sent by the… Read More
In this article, we will encrypt/decrypt an image using a simple mathematical logic. It requires two things, data and key and when XOR operation is… Read More
In stream cipher, one byte is encrypted at a time while in block cipher ~128 bits are encrypted at a time. Initially, a key(k) will… Read More
A cryptographic hash function is an exceptional class of hash function that has certain properties that make it appropriate for use in cryptography. It is… Read More
Cryptography is the practice of securing useful information while transmitting from one computer to another or storing data on a computer. Cryptography deals with the… Read More
Cryptography is the process or technique of converting plaintext into ciphertext to protect information from the hackers during transmission from one computer to another. Python… Read More
Encryption is the process of converting a normal message (plain text) into a meaningless message (Ciphertext). Whereas, Decryption is the process of converting a meaningless… Read More
Schnorr signature is known for its simplicity and is among the first whose security is based on the intractability of certain discrete logarithm problems. The… Read More
Computer Architectures have predefined ASCII values & Binary forms for all printable characters, which allows us to operate bit-wise logic like XOR and most encryption/decryption… Read More
Cryptographic Hash is a Hash function that takes random size input and yields a fixed-size output. It is easy to calculate but challenging to retrieve… Read More
A Secret Sharing Scheme is a Cryptographic Scheme that involves the breaking up of a secret value into multiple fragments/shares in a manner that prevents… Read More
Digital Signatures are an Asymmetrically encrypted hash of a digital message(data). It is a value that can provide a guarantee of authenticity, non-repudiation, and integrity.… Read More