Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The next step in privacy: A messenger that doesn't send data and doesn't keep your secrets. 🚀

The next step in privacy: A messenger that doesn't send data and doesn't keep your secrets. 🚀

9
Comments
5 min read
picoCTF flags writeup

picoCTF flags writeup

1
Comments
1 min read
picoCTF ReadMyCert writeup

picoCTF ReadMyCert writeup

Comments
1 min read
Enigma Machine : How a step on its rotor change the mapping

Enigma Machine : How a step on its rotor change the mapping

Comments
2 min read
Custom Prime-Based Key-Driven Encryption with Modulus Patterns
Cover image for Custom Prime-Based Key-Driven Encryption with Modulus Patterns

Custom Prime-Based Key-Driven Encryption with Modulus Patterns

6
Comments
3 min read
Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

1
Comments
2 min read
The Password That Never Was: How to Access Secrets That Were Always There. Smart Password Library. 🔐

The Password That Never Was: How to Access Secrets That Were Always There. Smart Password Library. 🔐

8
Comments
5 min read
The magic of messages that have always been with us 🧙‍♂️

The magic of messages that have always been with us 🧙‍♂️

7
Comments
3 min read
Beyond Checksums: Securing File Transfers with HMAC-SHA256
Cover image for Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
How to decrypt broken GCM ciphertext

How to decrypt broken GCM ciphertext

5
Comments
4 min read
🔐 What if the key to a secret was held by many, not one?

🔐 What if the key to a secret was held by many, not one?

Comments
1 min read
Chrono-Library Messenger: How to send a message without transmitting a single bit.💫
Cover image for Chrono-Library Messenger: How to send a message without transmitting a single bit.💫

Chrono-Library Messenger: How to send a message without transmitting a single bit.💫

7
Comments
5 min read
An Encryption Algorithm
Cover image for An Encryption Algorithm

An Encryption Algorithm

Comments
2 min read
Petoron Local Destroyer (PLD)
Cover image for Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
Petoron Quantum Standard (PQS)
Cover image for Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
TraplessPKE — A New Direction for Post-Quantum Cryptography

TraplessPKE — A New Direction for Post-Quantum Cryptography

Comments
2 min read
🔐 Building Quantum-Resistant ZKP: A Developer's Journey into Post-Quantum Cryptography

🔐 Building Quantum-Resistant ZKP: A Developer's Journey into Post-Quantum Cryptography

Comments
5 min read
CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument
Cover image for CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

1
Comments
2 min read
🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know
Cover image for 🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

1
Comments
3 min read
Symmetric vs Asymmetric Encryption — Lessons from the Field

Symmetric vs Asymmetric Encryption — Lessons from the Field

Comments
2 min read
Cryptographic Implementation Flaws: Modern Encryption Analysis

Cryptographic Implementation Flaws: Modern Encryption Analysis

1
Comments
3 min read
How to Build a Secure Node.js Application with Cryptography Best Practices
Cover image for How to Build a Secure Node.js Application with Cryptography Best Practices

How to Build a Secure Node.js Application with Cryptography Best Practices

Comments
3 min read
Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide
Cover image for Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide

Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide

2
Comments
3 min read
Post-Quantum Cryptography 2025: Latest Developments and Why It Matters

Post-Quantum Cryptography 2025: Latest Developments and Why It Matters

1
Comments
5 min read
I got 99 problems, but a breach ain’t one
Cover image for I got 99 problems, but a breach ain’t one

I got 99 problems, but a breach ain’t one

1
Comments
5 min read
loading...