## Custom Building Cryptography Algorithms (Hybrid Cryptography)

Cryptography can be defined as an art of encoding and decoding the patterns (in the form of messages). Cryptography is a very straightforward concept which… Read More »

## Data encryption standard (DES) | Set 1

Data encryption standard (DES) has been found vulnerable against very powerful attacks and therefore, the popularity of DES has been found slightly on decline. DES… Read More »

## Introduction to Crypto-terminologies

Cryptography is an important aspect when we deal with network security. ‘Crypto’ means secret or hidden. Cryptography is the science of secret writing with the… Read More »

## Difference between AES and DES ciphers

AES and DES are both examples of symmetric block ciphers but have certain dissimilarities.

The two types of traditional symmetric ciphers are Substitution Cipher and Transposition Cipher. The following flowchart categories the traditional ciphers: 1. Substitution Cipher: Substitution Ciphers… Read More »

## Understanding Rainbow Table Attack

What is a Rainbow Table? The passwords in a computer system are not stored directly as plain texts, but are hashed using encryption. A hash… Read More »

## Latin alphabet cipher

The Latin Alphabet Cipher Encryption Technique is one of the earliest and simplest techniques of encrypting data. It’s simply a type of substitution cipher technique,… Read More »

## DNA Cryptography

Cryptography is the branch of science which deals with the encoding of information for the purpose of hiding messages. It plays a vital role in… Read More »

## Image based Steganography using Python

Steganography is the method of hiding secret data in any image/audio/video. In a nutshell, the main motive of steganography is to hide the intended information… Read More »

## Hill Cipher

Hill cipher is a polygraphic substitution cipher based on linear algebra.Each letter is represented by a number modulo 26. Often the simple scheme A =… Read More »

## XOR Encryption by Shifting Plaintext

Here is a cipher algorithm, based on hexadecimal strings that is implemented by XORing the given plaintext, N number of times where N is its… Read More »

## Image Steganography in Cryptography

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’.… Read More »

## RSA Algorithm using Multiple Precision Arithmetic Library

Public Key Cryptography is also known as Asymmetric Cryptography is the type of cryptography which involves the usage of two keys namely Public Key and… Read More »

## MD5 hash in Python

Cryptographic hashes are used in day-day life like in digital signatures, message authentication codes, manipulation detection, fingerprints, checksums (message integrity check), hash tables, password storage… Read More »

## SHA in Python

SHA, ( Secure Hash Algorithms ) are set of cryptographic hash functions defined by the language to be used for various applications such as password… Read More »