Quantcast
Channel: Linux Security
Browsing all 38 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

cryptography2

Cryptography 2Symmetric EncryptionSymmetric encryption or symmetric key or single-key encryption is an encryption system which the encryption and the decryption processes are preforms using the same...

View Article


Image may be NSFW.
Clik here to view.

cryptography3

Cryptography 3Classical Encryption Techniques:As we mentioned earlier , the basic of all encryption techniques are based on 2 techniques 1- Substitution2- Transpositionand we can also use a combination...

View Article


Image may be NSFW.
Clik here to view.

cryptography4

Cryptography 4Classical Encryption Techniques 2:B- Polyalphabetic Cipher:Polyalphabetic Cipher is an encryption method to improve the simple substitution cipher techniques by using a larger key space...

View Article

Image may be NSFW.
Clik here to view.

cryptography5

Cryptography 5Classical Encryption Techniques:2- Transposition Cipher:Transposition Cipher is an encryption method which elements are rearranged.There are many types of Transposition Cipher such as...

View Article

Image may be NSFW.
Clik here to view.

cryptography6

Cryptography 6Block CipherBlock cipher is an encryption method which the encryption algorithm operates on a plaintext block of n bits and produces a block of n bits ciphertext.Block Cipher has 2^n...

View Article


Image may be NSFW.
Clik here to view.

cryptography7

Cryptography 7DES (Data Encryption Standered)DES :DES adopted in 1977 by (NIST) National Institute of Slandered and Technology).In DES data are encrypted in 64 bit block with a key length 56 bits and...

View Article

Image may be NSFW.
Clik here to view.

cryptography8

Cryptography 8Finite FieldIn this section we will talk about something in abstract algebra, and i'm trying to make it painless and simple.Finite Fields is a vary important topic in cryptography and it...

View Article

Image may be NSFW.
Clik here to view.

cryptography9

Cryptography 9Simplified AESSimplified AES is an educational algorithm to understand AES encryption algorithm , Simplified AES has the exact same structure of AES but with smaller parameters.Simplified...

View Article


Image may be NSFW.
Clik here to view.

cryptography10

Cryptography 10AESAES takes a plaintext block 16 bytes (128 bits) and key length 16, 24, 32 bytes (128, 192, 256 bits) AES-128, AES-192, AES-256 depending on key length.The input to encryption or...

View Article


Image may be NSFW.
Clik here to view.

cryptography11

Cryptography 11Pseudorandom Number Generation (PRNG)We uses PRNGs everyday over internet, network security applications and Protocols such as RSA and authentication algorithms.There are two...

View Article

Image may be NSFW.
Clik here to view.

cryptography12

Cryptography 12RSARSA is a block cipher, the block size must be less than or equal .\(\log_{2}(n)+1\), if block size =i bits \(2^{i}<n<2^{i}+1\)The encryption and decryption are on the following...

View Article

Image may be NSFW.
Clik here to view.

cryptography13

Cryptography 13Diffie-Hellman Key ExchangeDiffie-Hellman is a key exchange algorithm based on public key cryptography written by Diffie and HellmanDiffie-Hellman Algorithm :First we have to know the...

View Article

Image may be NSFW.
Clik here to view.

cryptography14

Cryptography 14Elgamal Cryptographic SystemElgamal cryptographic system is a public-key algorithm based on discrete logarithm.Elgamal cryptographic system is used in digital signature standard...

View Article


Image may be NSFW.
Clik here to view.

cryptography15

Cryptography 15Elliptic CurveElliptic curve is an equation with two variables and coefficients and it is a cubic equation like the following form:\(y^{2}+axy+by=x^{3}+cx^{2}+dx+e\)\(y^{2}=x^{3}\)Let's...

View Article

Image may be NSFW.
Clik here to view.

cryptography16

Cryptography 16Hash FunctionsWhat is hash function ?!Hash function maps a variable length message into a fixed length hash value.Cryptographic hash function is an algorithm for which no attack is more...

View Article


Image may be NSFW.
Clik here to view.

cryptography17

Cryptography 17Secure Hashing Algorithm (SHA)Secure Hashing Algorithm (SHA) is based on the hash function MD4 ,SHA was developed by National Institute of Standards and Technology (NIST) and published...

View Article

Image may be NSFW.
Clik here to view.

cryptography18

Cryptography 18Digital SignatureDigital Signature is an authentication mechanism tha enable the creator of a message to attach a code that act as a signature.Digital Signature is formed by taking the...

View Article


Image may be NSFW.
Clik here to view.

Secure browsing and Escaping firewall by using SSH

Secure browsing and escaping firewall by using SSHThis article about how to build a secure browsing environment and how to escape firewall rules or even escaping ISPs rules over browsing (HTTP and...

View Article
Browsing all 38 articles
Browse latest View live