## Latin alphabet cipher

The Latin Alphabet Cipher Encryption Technique is one of the earliest and simplest techniques of encrypting data. It’s simply a type of substitution cipher technique,… Read More »

- Cryptography | Introduction to Crypto-terminologies
- Computer Network | Birthday attack
- Computer Network | Data encryption standard (DES) | Set 1
- SHA-256 Hash in Java
- How to solve RSA Algorithm Problems?
- ElGamal Encryption Algorithm
- Computer Network | Cryptography Introduction
- Cryptography | Development of Cryptography
- Custom Building Cryptography Algorithms (Hybrid Cryptography)
- Core Defences Mechanism in Web Applications
- Quantum Cryptography
- Challenge Response Authentication Mechanism (CRAM)

The Latin Alphabet Cipher Encryption Technique is one of the earliest and simplest techniques of encrypting data. It’s simply a type of substitution cipher technique,… Read More »

Cryptography is the branch of science which deals with the encoding of information for the purpose of hiding messages. It plays a vital role in… Read More »

Steganography is the method of hiding secret data in any image/audio/video. In a nutshell, the main motive of steganography is to hide the intended information… Read More »

Hill cipher is a polygraphic substitution cipher based on linear algebra.Each letter is represented by a number modulo 26. Often the simple scheme A =… Read More »

Here is a cipher algorithm, based on hexadecimal strings that is implemented by XORing the given plaintext, N number of times where N is its… Read More »

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’.… Read More »

Public Key Cryptography is also known as Asymmetric Cryptography is the type of cryptography which involves the usage of two keys namely Public Key and… Read More »

Cryptographic hashes are used in day-day life like in digital signatures, message authentication codes, manipulation detection, fingerprints, checksums (message integrity check), hash tables, password storage… Read More »

SHA, ( Secure Hash Algorithms ) are set of cryptographic hash functions defined by the language to be used for various applications such as password… Read More »

Prerequisite : RSA Algorithm Why RSA decryption is slow ? RSA decryption is slower than encryption because while doing decryption, private key parameter ” d… Read More »

Hash Function is a function which has a huge role in making a System Secure as it converts normal data given to it as an… Read More »

Message Authentication Codes are the codes which plays their role in two important functions : Authentication Detection and Falsification Detection. Where do we need these… Read More »

When talking about network security, the CIA triad is one of the most important model which is designed to guide policies for information security within… Read More »

The Luhn algorithm, also known as the modulus 10 or mod 10 algorithm, is a simple checksum formula used to validate a variety of identification… Read More »

HMAC is a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in… Read More »