Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
Quantum Dawn: Hardening Our Networks Before the Storm

Quantum Dawn: Hardening Our Networks Before the Storm

Comments
2 min read
Secure Remote Password (SRP) protocol
Cover image for Secure Remote Password (SRP) protocol

Secure Remote Password (SRP) protocol

Comments
14 min read
My Path to Decentralization

My Path to Decentralization

Comments
4 min read
Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp
Cover image for Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

2
Comments
3 min read
Sorting encrypted data without decryption: a practical trick
Cover image for Sorting encrypted data without decryption: a practical trick

Sorting encrypted data without decryption: a practical trick

1
Comments
5 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
Merkle Trees in SQLite with Python: A Practical Tutorial

Merkle Trees in SQLite with Python: A Practical Tutorial

Comments
6 min read
picoCTF flags writeup

picoCTF flags writeup

1
Comments
1 min read
Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)
Cover image for Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

6
Comments
3 min read
Enigma Machine : How a step on its rotor change the mapping

Enigma Machine : How a step on its rotor change the mapping

Comments
2 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

Comments
2 min read
A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1
Cover image for A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

3
Comments 1
3 min read
Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

1
Comments
2 min read
Encryption & SSL Certificates with OpenSSL
Cover image for Encryption & SSL Certificates with OpenSSL

Encryption & SSL Certificates with OpenSSL

15
Comments 1
5 min read
How RSA Works (for Dummies)

How RSA Works (for Dummies)

3
Comments 2
4 min read
Beyond Checksums: Securing File Transfers with HMAC-SHA256
Cover image for Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
How Does Public Key Cryptography Work?
Cover image for How Does Public Key Cryptography Work?

How Does Public Key Cryptography Work?

Comments
3 min read
How to decrypt broken GCM ciphertext

How to decrypt broken GCM ciphertext

1
Comments
4 min read
🔐 What if the key to a secret was held by many, not one?

🔐 What if the key to a secret was held by many, not one?

Comments
1 min read
picoCTF ReadMyCert writeup

picoCTF ReadMyCert writeup

Comments
1 min read
An Encryption Algorithm
Cover image for An Encryption Algorithm

An Encryption Algorithm

Comments
2 min read
Petoron Quantum Standard (PQS)
Cover image for Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
Petoron Local Destroyer (PLD)
Cover image for Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
loading...