Prerequisite: Diffie-Hellman Algorithm Diffie-Hellman Key Exchange algorithm is an advanced cryptographic method used to establish a shared secret (or shared secret key) that can be… Read More

# Tag Archives: cryptography

In this article, we will discuss the overview of symmetric encryption protocols and the Need for Asymmetric Encryption came into the picture, here we will… Read More

Given a string S of length N, the task is to find the SHA-512 Hash Value of the given string S. Examples: Input: S =… Read More

Cloud Cryptography is encryption that safeguards data stored within the cloud. Several measures are being placed within cloud cryptography which adds a strong layer of… Read More

Prerequisite – Simplified Data Encryption Standard | Set 1 Simplified Data Encryption Standard is a simple version of Data Encryption Standard having a 10-bit key… Read More

Cyber Security :Cybersecurity, as the name suggests, is a process or measures taken by organizations or experts to protect devices, computer networks, or data from… Read More

1. Encryption :Encryption, as name suggests, is generally a technique that is used to conceal message using algorithms. It is fundamental application of cryptography that… Read More

Password Entropy is the measure of password strength or how strong the given password is. It is a measure of effectiveness of a password against… Read More

In this article, we will learn about Encryption, Decryption and implement them with Python. Encryption: Encryption is the process of encoding the data. i.e converting… Read More

Simplified Data Encryption Standard (S-DES) is a simple version of the DES Algorithm. It is similar to the DES algorithm but is a smaller algorithm… Read More

Encryption and hashing are the two terms used widely in cryptography. In this article, we will learn what is the difference between encryption and hashing.… Read More

Encryption and Encoding are the terms commonly interchanged and used incorrectly. There is a lot of difference between these two terms and it is very… Read More

This algorithm is used to maintain the causal ordering of the messages i.e. the message which is sent first should be received first. If send… Read More

Digital Signature : As the name sounds are the new alternative to sign a document digitally. It ensures that the message is sent by the… Read More

In this article, we will encrypt/decrypt an image using a simple mathematical logic. It requires two things, data and key and when XOR operation is… Read More