Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)
Cover image for Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Comments
7 min read
Digital Signatures: Mechanics and Go Benchmarks (RSA vs ECDSA vs Ed25519)
Cover image for Digital Signatures: Mechanics and Go Benchmarks (RSA vs ECDSA vs Ed25519)

Digital Signatures: Mechanics and Go Benchmarks (RSA vs ECDSA vs Ed25519)

Comments
7 min read
Week 2: Multiplicative Inverses in Finite Fields: When Division Still Works in a Closed World
Cover image for Week 2: Multiplicative Inverses in Finite Fields: When Division Still Works in a Closed World

Week 2: Multiplicative Inverses in Finite Fields: When Division Still Works in a Closed World

Comments
4 min read
A Metaclass Architecture for Encryption: Keys as Algorithm Generators
Cover image for A Metaclass Architecture for Encryption: Keys as Algorithm Generators

A Metaclass Architecture for Encryption: Keys as Algorithm Generators

5
Comments 1
6 min read
DES Encryption Explained Simply

DES Encryption Explained Simply

4
Comments
2 min read
Beyond the Wire: Encrypting Messages Where the Message Never Exists

Beyond the Wire: Encrypting Messages Where the Message Never Exists

Comments
3 min read
Quantum Ready: How Trinity Protocol Survives the Post Quantum Era
Cover image for Quantum Ready: How Trinity Protocol Survives the Post Quantum Era

Quantum Ready: How Trinity Protocol Survives the Post Quantum Era

Comments
6 min read
AIDE Automation Framework From Integrity Checks to Self-Verification
Cover image for AIDE Automation Framework From Integrity Checks to Self-Verification

AIDE Automation Framework From Integrity Checks to Self-Verification

1
Comments
4 min read
Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Comments
2 min read
CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃
Cover image for CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

Comments
2 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern
Cover image for Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

Comments
2 min read
Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Comments
2 min read
Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Comments
2 min read
Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Comments
2 min read
AIDE in Motion Automating and Signing System Integrity Checks
Cover image for AIDE in Motion Automating and Signing System Integrity Checks

AIDE in Motion Automating and Signing System Integrity Checks

Comments
5 min read
AES Algorithm for beginners

AES Algorithm for beginners

Comments
11 min read
Getting Started with eslint-plugin-crypto
Cover image for Getting Started with eslint-plugin-crypto

Getting Started with eslint-plugin-crypto

Comments
2 min read
Finite Fields: The Hidden Math Powering Blockchains
Cover image for Finite Fields: The Hidden Math Powering Blockchains

Finite Fields: The Hidden Math Powering Blockchains

Comments
2 min read
How to implement GHASH

How to implement GHASH

Comments
9 min read
Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD
Cover image for Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

5
Comments
2 min read
Looking for security feedback on a side project I’ve been building
Cover image for Looking for security feedback on a side project I’ve been building

Looking for security feedback on a side project I’ve been building

2
Comments 6
1 min read
Cryptography in 2025: The Quantum Leap and the AI Arms Race

Cryptography in 2025: The Quantum Leap and the AI Arms Race

Comments
3 min read
Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Comments
4 min read
npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

Comments 1
2 min read
loading...