cryptography2
Cryptography 2Symmetric EncryptionSymmetric encryption or symmetric key or single-key encryption is an encryption system which the encryption and the decryption processes are preforms using the same...
View Articlecryptography3
Cryptography 3Classical Encryption Techniques:As we mentioned earlier , the basic of all encryption techniques are based on 2 techniques 1- Substitution2- Transpositionand we can also use a combination...
View Articlecryptography4
Cryptography 4Classical Encryption Techniques 2:B- Polyalphabetic Cipher:Polyalphabetic Cipher is an encryption method to improve the simple substitution cipher techniques by using a larger key space...
View Articlecryptography5
Cryptography 5Classical Encryption Techniques:2- Transposition Cipher:Transposition Cipher is an encryption method which elements are rearranged.There are many types of Transposition Cipher such as...
View Articlecryptography6
Cryptography 6Block CipherBlock cipher is an encryption method which the encryption algorithm operates on a plaintext block of n bits and produces a block of n bits ciphertext.Block Cipher has 2^n...
View Articlecryptography7
Cryptography 7DES (Data Encryption Standered)DES :DES adopted in 1977 by (NIST) National Institute of Slandered and Technology).In DES data are encrypted in 64 bit block with a key length 56 bits and...
View Articlecryptography8
Cryptography 8Finite FieldIn this section we will talk about something in abstract algebra, and i'm trying to make it painless and simple.Finite Fields is a vary important topic in cryptography and it...
View Articlecryptography9
Cryptography 9Simplified AESSimplified AES is an educational algorithm to understand AES encryption algorithm , Simplified AES has the exact same structure of AES but with smaller parameters.Simplified...
View Articlecryptography10
Cryptography 10AESAES takes a plaintext block 16 bytes (128 bits) and key length 16, 24, 32 bytes (128, 192, 256 bits) AES-128, AES-192, AES-256 depending on key length.The input to encryption or...
View Articlecryptography11
Cryptography 11Pseudorandom Number Generation (PRNG)We uses PRNGs everyday over internet, network security applications and Protocols such as RSA and authentication algorithms.There are two...
View Articlecryptography12
Cryptography 12RSARSA is a block cipher, the block size must be less than or equal .\(\log_{2}(n)+1\), if block size =i bits \(2^{i}<n<2^{i}+1\)The encryption and decryption are on the following...
View Articlecryptography13
Cryptography 13Diffie-Hellman Key ExchangeDiffie-Hellman is a key exchange algorithm based on public key cryptography written by Diffie and HellmanDiffie-Hellman Algorithm :First we have to know the...
View Articlecryptography14
Cryptography 14Elgamal Cryptographic SystemElgamal cryptographic system is a public-key algorithm based on discrete logarithm.Elgamal cryptographic system is used in digital signature standard...
View Articlecryptography15
Cryptography 15Elliptic CurveElliptic curve is an equation with two variables and coefficients and it is a cubic equation like the following form:\(y^{2}+axy+by=x^{3}+cx^{2}+dx+e\)\(y^{2}=x^{3}\)Let's...
View Articlecryptography16
Cryptography 16Hash FunctionsWhat is hash function ?!Hash function maps a variable length message into a fixed length hash value.Cryptographic hash function is an algorithm for which no attack is more...
View Articlecryptography17
Cryptography 17Secure Hashing Algorithm (SHA)Secure Hashing Algorithm (SHA) is based on the hash function MD4 ,SHA was developed by National Institute of Standards and Technology (NIST) and published...
View Articlecryptography18
Cryptography 18Digital SignatureDigital Signature is an authentication mechanism tha enable the creator of a message to attach a code that act as a signature.Digital Signature is formed by taking the...
View ArticleSecure browsing and Escaping firewall by using SSH
Secure browsing and escaping firewall by using SSHThis article about how to build a secure browsing environment and how to escape firewall rules or even escaping ISPs rules over browsing (HTTP and...
View Article