What is Cryptography? A Complete Overview

what is cryptography guide

What is cryptography? Simply put, Cryptography provides a method for secure communication. It stops unauthorized parties, commonly referred to as adversaries or hackers, from gaining access to the secret messages communicated between authorized parties. The method that cryptography provides is called encryption. Encryption transforms a key and input, the plaintext, into an encrypted output, the …

Read more

Intro to the One-Time Pad Cipher

eyeball art

In cryptography, the one-time pad, or OTP is a way of encrypting information so securely that it’s impossible to be cracked. That said, OTP has a major drawback in that it requires both parties to have access to the same key before a message is encrypted. How the one-time pad cipher works When using the one-time pad, a …

Read more

Base64 vs Base58 Encoding

Base64 vs Base58 Encoding

Base64 is one of the most popular encoding formats for representing data. Have some binary data? Base64 encodes it for convenient readability and parsing. Base58 is just another encoding format (with 58 characters instead of 64, and has gained popularity largely due to Bitcoin and other cryptocurrencies. Also, if you came here confused, encryption and …

Read more

What Is Entropy In Cryptography?

What is entropy in Cryptography

In cryptography, entropy refers to the randomness collected by a system for use in algorithms that require random data. A lack of good entropy can leave a cryptosystem vulnerable and unable to encrypt data securely.

Basic Intro to Elliptic Curve Cryptography

Elliptic curve blog post min

Elliptic Curve Cryptography is a modern public-key encryption technique based on mathematical elliptic curves that is known for producing smaller, faster, and more efficient cryptographic keys. Bitcoin, for example, uses ECC as an asymmetric cryptosystem because it is so lightweight. In this introduction to ECC, I want to focus on the main ideas that make …

Read more

Is AES-256 Quantum Resistant?

Is AES-256 Quantum Resistant?

With quantum computers getting more powerful each year, many worry about the safety of modern encryption standards. As quantum computers improve in performance and the number of qubits used for calculations increases, current cryptosystems are under threat. AES-256 is one of the most powerful symmetric ciphers, but will it remain secure in a post-quantum world? …

Read more

Bcrypt Step by Step

lock

Bcrypt is a key derivation function, which can be thought of as a special kind of hash function. Its purpose is to slowly convert a piece of input data to a fixed-size, deterministic, and unpredictable output. A common use case is to convert a password into an n-bit cryptographic key, which can then be used …

Read more

(Very) Basic Intro to Lattices in Cryptography

Intro to Lattice-Based Cryptography

Lattice-based cryptography, an important contender in the race for quantum-safe encryption, describes constructions of cryptographic primitives that involve mathematical lattices. Lattices, as they relate to crypto, have been coming into the spotlight recently. In January 2019, Many of the semifinalists in the NIST post-quantum-cryptography competition were based on lattices. Lattice-based cryptography has promising aspects that give us hope …

Read more

Shamir’s Secret Sharing Step-By-Step

library scaled

Adi Shamir’s Secret Sharing is a cryptographic algorithm that allows distinct parties to jointly share ownership of a single secret by holding shares. The original secret can only be reconstructed by using a minimum number of shares, which allows different parties to cooperate without the need to fully trust one another. Example Problem To illustrate, …

Read more

“Practical Cryptography” Course Released

practical cryptography course 1024x576 2

We just launched our new Practical Cryptography course, a code-in-the-browser tutorial where students build cryptographic functions in the Go programming language. Practical Cryptography stands out among online cryptography courses because it not only teaches crypto fundamentals, but it allows users to get hands-on experience building out the code. What’s Included? The course has four modules …

Read more