Skip to content

Tag Archives: cryptography

Prerequisite: Diffie-Hellman Algorithm  Diffie-Hellman Key Exchange algorithm is an advanced cryptographic method used to establish a shared secret (or shared secret key) that can be… Read More
In this article, we will discuss the overview of symmetric encryption protocols and the Need for Asymmetric Encryption came into the picture, here we will… Read More
Given a string S of length N, the task is to find the SHA-512 Hash Value of the given string S. Examples: Input: S =… Read More
Cloud Cryptography is encryption that safeguards data stored within the cloud. Several measures are being placed within cloud cryptography which adds a strong layer of… Read More
Prerequisite – Simplified Data Encryption Standard | Set 1 Simplified Data Encryption Standard is a simple version of Data Encryption Standard having a 10-bit key… Read More
Cyber Security :Cybersecurity, as the name suggests, is a process or measures taken by organizations or experts to protect devices, computer networks, or data from… Read More
1. Encryption :Encryption, as name suggests, is generally a technique that is used to conceal message using algorithms. It is fundamental application of cryptography that… Read More
Password Entropy is the measure of password strength or how strong the given password is. It is a measure of effectiveness of a password against… Read More
In this article, we will learn about Encryption, Decryption and implement them with Python.  Encryption: Encryption is the process of encoding the data. i.e converting… Read More
Simplified Data Encryption Standard (S-DES) is a simple version of the DES Algorithm. It is similar to the DES algorithm but is a smaller algorithm… Read More
Encryption and hashing are the two terms used widely in cryptography. In this article, we will learn what is the difference between encryption and hashing.… Read More
Encryption and  Encoding are the terms commonly interchanged and used incorrectly. There is a lot of difference between these two terms and it is very… Read More
This algorithm is used to maintain the causal ordering of the messages i.e. the message which is sent first should be received first. If send… Read More
Digital Signature : As the name sounds are the new alternative to sign a document digitally. It ensures that the message is sent by the… Read More
In this article, we will encrypt/decrypt an image using a simple mathematical logic. It requires two things, data and key and when XOR operation is… Read More