# Tag Archives: cryptography

## Implementing Atbash Cipher

Definition: Atbash cipher is a substitution cipher with just one specific key where all the letters are reversed that is A to Z and Z… Read More »

## ROT13 cipher

ROT13 cipher(read as – “rotate by 13 places”) is a special case of the Ceaser cipher in which the shift is always 13. So every… Read More »

## Passwords and Cryptographic hash function

We have introduced and discussed importance of hashed passwords. To create strong hashed passwords, we must understand some terminology related to it and then we… Read More »

## Columnar Transposition Cipher

Given a plain-text message and a numeric key, cipher/de-cipher the given text using Columnar Transposition Cipher The Columnar Transposition Cipher is a form of transposition… Read More »

## RSA Algorithm in Cryptography

filter_none edit close play_arrow link brightness_4 code # Write Python3 code here from decimal import Decimal    def gcd(a,b):     if b==0:         return a     else:         return… Read More »

## Implementation of Affine Cipher

The Affine cipher is a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a… Read More »

## Digital Signatures and Certificates

Encryption – Process of converting electronic data into another form, called cipher text, which cannot be easily understood by anyone except the authorized parties.This assures… Read More »

## Rail Fence Cipher – Encryption and Decryption

Given a plain-text message and a numeric key, cipher/de-cipher the given text using Rail Fence algorithm. The rail fence cipher (also called a zigzag cipher)… Read More »

## XOR Cipher

XOR Encryption is an encryption method used to encrypt data and is hard to crack by brute-force method, i.e generating random encryption keys to match… Read More »

## Vigenère Cipher

Vigenere Cipher is a method of encrypting alphabetic text. It uses a simple form of polyalphabetic substitution. A polyalphabetic cipher is any cipher based on… Read More »

## Caesar Cipher in Cryptography

The Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It’s simply a type of substitution cipher, i.e., each letter… Read More »

## Program to find parity

Parity: Parity of a number refers to whether it contains an odd or even number of 1-bits. The number has “odd parity”, if it contains… Read More »