# Tag Archives: cryptography

## RSA Algorithm using Multiple Precision Arithmetic Library

Public Key Cryptography is also known as Asymmetric Cryptography is the type of cryptography which involves the usage of two keys namely Public Key and… Read More »

## MD5 hash in Python

Cryptographic hashes are used in day-day life like in digital signatures, message authentication codes, manipulation detection, fingerprints, checksums (message integrity check), hash tables, password storage… Read More »

## SHA in Python

SHA, ( Secure Hash Algorithms ) are set of cryptographic hash functions defined by the language to be used for various applications such as password… Read More »

## Weak RSA decryption with Chinese-remainder theorem

Prerequisite : RSA Algorithm Why RSA decryption is slow ? RSA decryption is slower than encryption because while doing decryption, private key parameter ” d… Read More »

## Hash Functions in System Security

Hash Function is a function which has a huge role in making a System Secure as it converts normal data given to it as an… Read More »

## Message Authentication Codes

Message Authentication Codes are the codes which plays their role in two important functions : Authentication Detection and Falsification Detection. Where do we need these… Read More »

## The CIA triad in Cryptography

When talking about network security, the CIA triad is one of the most important model which is designed to guide policies for information security within… Read More »

## Luhn algorithm

The Luhn algorithm, also known as the modulus 10 or mod 10 algorithm, is a simple checksum formula used to validate a variety of identification… Read More »

## hmac – Keyed-Hashing for Message Authentication

HMAC is a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in… Read More »

## Null Cipher

A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher… Read More »

## Onion Routing

Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to… Read More »

## Compute the parity of a number using XOR and table look-up

Parity of a number refers to whether it contains an odd or even number of 1-bits. The number has “odd parity”, if it contains odd… Read More »

## Keyword Cipher

A keyword cipher is a form of monoalphabetic substitution. A keyword is used as the key, and it determines the letter matchings of the cipher… Read More »

## Baconian Cipher

Bacon’s cipher or the Baconian cipher is a method of steganography (a method of hiding a secret message as opposed to just a cipher) devised… Read More »

## Implementing Atbash Cipher

Definition: Atbash cipher is a substitution cipher with just one specific key where all the letters are reversed that is A to Z and Z… Read More »