## Traditional Symmetric Ciphers

The two types of traditional symmetric ciphers are Substitution Cipher and Transposition Cipher. The following flowchart categories the traditional ciphers: 1. Substitution Cipher: Substitution Ciphers… Read More »

- Playfair Cipher with Examples
- Difference between Confusion and Diffusion
- Vernam Cipher in Cryptography
- Cryptography and its Types
- Hamming code Implementation in Java
- Bifid Cipher in Cryptography
- Program to find the Encrypted word
- Difference between MD5 and SHA1
- Blowfish Algorithm with Examples
- Encryption, Its Algorithms And Its Future
- A Model for Network Security
- Message Digest in Information security
- Voice Biometric Technique in Network Security

The two types of traditional symmetric ciphers are Substitution Cipher and Transposition Cipher. The following flowchart categories the traditional ciphers: 1. Substitution Cipher: Substitution Ciphers… Read More »

What is a Rainbow Table? The passwords in a computer system are not stored directly as plain texts, but are hashed using encryption. A hash… Read More »

The Latin Alphabet Cipher Encryption Technique is one of the earliest and simplest techniques of encrypting data. It’s simply a type of substitution cipher technique,… Read More »

Cryptography is the branch of science which deals with the encoding of information for the purpose of hiding messages. It plays a vital role in… Read More »

Steganography is the method of hiding secret data in any image/audio/video. In a nutshell, the main motive of steganography is to hide the intended information… Read More »

Hill cipher is a polygraphic substitution cipher based on linear algebra.Each letter is represented by a number modulo 26. Often the simple scheme A =… Read More »

Here is a cipher algorithm, based on hexadecimal strings that is implemented by XORing the given plaintext, N number of times where N is its… Read More »

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’.… Read More »

Public Key Cryptography is also known as Asymmetric Cryptography is the type of cryptography which involves the usage of two keys namely Public Key and… Read More »

Cryptographic hashes are used in day-day life like in digital signatures, message authentication codes, manipulation detection, fingerprints, checksums (message integrity check), hash tables, password storage… Read More »

SHA, ( Secure Hash Algorithms ) are set of cryptographic hash functions defined by the language to be used for various applications such as password… Read More »

Prerequisite : RSA Algorithm Why RSA decryption is slow ? RSA decryption is slower than encryption because while doing decryption, private key parameter ” d… Read More »

Hash Function is a function which has a huge role in making a System Secure as it converts normal data given to it as an… Read More »

Message Authentication Codes are the codes which plays their role in two important functions : Authentication Detection and Falsification Detection. Where do we need these… Read More »

When talking about network security, the CIA triad is one of the most important model which is designed to guide policies for information security within… Read More »