Blog Posts - Cryptography



CS6701 cryptography and Network Security Question Bank

Anna University Chennai DEPARTMENT OF INFORMATION AND TECHNOLOGY QUESTION BANK SUBJECT : CS6701 CRYPTOGRAPHY AND NETWORK SECURITY SEM / YEAR : VII/ IVyear B.TECH Download Link => https://goo.gl/9Bqxlo...
by University Question Papers on Jul 10, 2016

CS6701 Cryptography and Network Security Question Bank

Anna University , Chennai Department of B.E-Computer Science and Engineering Final Year Seventh Semester CS6701 Cryptography and Network Security Solved Question Bank - 2016 Edition (Regulation 2013) Attachment: https://goo.gl/yVTmyJ...
by University Question Papers on Jul 8, 2016

Steal Secret Encryption Keys from Android and iOS SmartPhones

Unlike desktops, your mobile devices carry all sorts of information from your personal emails to your sensitive financial details. And due to this, the hackers have shifted their interest to the mobile platform.Every week new exploits are discovered...
by Tech Holics Blog on Mar 11, 2016

Cryptography and Network Security by Williams Stalling pdf free.

Download Cryptography e-book by William Stallings.Download the essential and recommended textbook (e-book) in most of the Engineering Colleges for Diploma or Bachelor's degree in Computer Science & Engineering, and Information Technology, an...
by Poweredup e-Learning on Mar 8, 2016

Cryptography and Network Security by Forouzan pdf free download.

Download Cryptography e-book by Behrouz A. ForouzanDownload the essential and recommended textbook (e-book) in most of the Engineering Colleges for Diploma or Bachelor's degree in Computer Science & Engineering, and Information Tec...
by Poweredup e-Learning on Mar 8, 2016

[TUTORIAL] Cryptography Fundamentals for Java and .NET Developers

Description: Cryptography ensures confidentiality and authenticity of digital documents. The mathematics behind cryptography show us why, and how far, it can be trusted. The Java and .NET frameworks contain all the algorithms you need to keep your us...
by tutgfx on May 28, 2014

[Cryptography] Hash Functions (and Passwords)

These days, the ‘Hash Functions’ have taken over the greatest security systems in the world; they can be used for passwords on websites, for checking whether a file is valid, and more. Everything that requires something that needs to be c...

[Cryptography] Password Protection Methods

These days, everything has a password. And the safest way to make sure you’re the only one to know your own password, we started using hash functions. A great deal of how passwords and hashes are combined is already discussed in this post, I su...

[Cryptanalysis] (Hash) Rainbow Table Attacks

A rainbow table attack is a method used to attack and hack something that is protected using hash functions. It uses a so-called pre-computed rainbow table. This rainbow table is a very large table which consists of a combination of a certain inpu...

[Cryptanalysis] Hash Collision Attacks

One way hackers found to get around things protected with hashes is a Collision Attack. A hash is basically a function that can have any input length, but will always produce the exact same output length. Therefore, it is impossible for every strin...

[Math] The Birthday Problem (and Pigeonhole Principle)

The birthday problem is actually an example of the pigeonhole principle, so I’ll start with explaining that. Pigeonhole Principle The pigeonhole principle simply states, that if you have m holes to choose from and you have n things to put i...

Tor to Release Instant Messaging Bundle (TIMB)

The TOR project is about to join the world of secure instant messaging, laying out a roadmap that would see its first code for a new project delivered by the end of March 2014. The first aim of the Tor Instant Messaging Bundle will be to get experime...
by insecure on Feb 28, 2014

How Computers Generate Random Numbers

Computers generate random number for everything from cryptography to video games and gambling. There are two categories of random numbers — “true” random numbers and pseudorandom numbers — and the […]...
by HackShark - secure your fence on Feb 23, 2014

[Cryptography] Symbolic/Exotic Ciphers

A cryptography technique that’s not very secure, but that is often used for fun or small scale usefulness, are the so-called symbolic or exotic ciphers. These are part of the very large group of substitution ciphers - you substitute letters...

[Cryptography] One Time Pad

After the Caesar Cipher and then the Vigenere Cipher, when approaching the 20th century the people needed new cryptographic methods. Everybody knew those famous substitution ciphers, and even if they didn’t know, they could quickly figure out...

[Cryptography] The Block Cipher

The Block Cipher is a relatively little known symmetric encryption system, that’s still used today in modern computers. It uses a certain table (usually ASCII) to convert symbols to binary codes (or ‘bytes’), then it uses a keyword...

[Cryptography] Transposition Ciphers

Transposition ciphers make up a great group of methods in the cryptography world, because there’s lots of variations in which it can be used. A transposition cipher is based on putting letters in different places (hence ‘transposition...

[Cryptography] Polyalphabetic Cipher

In the 16th century, there was a mathematician, Blaise de Vigenere was the name, who developed an advanced/improved version of the Caesar Cipher. He called it the Vigenere cipher, though most people these days know it as a polyalphabetic cipher. Wha...

[Cryptanalysis] Man-in-the-middle Attack

One of the most unknown hacking methods, is actually one of the strongest ones – the Man-in-the-middle Attack (MITM or MiM). It’s often tried, as seen that any evil person only needs to be fooled once (into thinking he/she is just visitin...

[Cryptanalysis] Dictionary Attacks

Dictionary attacks are actually derived from brute force attacks, but are (when used properly and effectively) much more efficient. A brute force attack tries all possible combinations, a dictionary attack tries all probable combinations. What bas...


Trending Topics

Close