## Cryptography | One Time Password (OTP) algorithm

Authentication, the process of identifying and validating an individual is the rudimentary step before granting access to any protected service (such as a personal account).… Read More »

- SHA-256 Hash in Java
- How to solve RSA Algorithm Problems?
- Cryptography | One Time Password (OTP) algorithm
- ElGamal Encryption Algorithm
- Computer Network | Cryptography Introduction
- Cryptography | Development of Cryptography
- Quantum Cryptography
- What is Cross Site Request Forgery (CSRF)
- Core Defences Mechanism in Web Applications
- Challenge Response Authentication Mechanism (CRAM)
- Text extraction from image using LSB based steganography

Authentication, the process of identifying and validating an individual is the rudimentary step before granting access to any protected service (such as a personal account).… Read More »

The uncertainty principle of quantum physics builds the earliest foundations for quantum cryptography. With quantum computers of future being expected to solve discrete logarithmic problem… Read More »

Challenge Response Authentication Mechanism (CRAM) is the most often used way to authenticate actions. They are a group of protocols in which one side presents… Read More »

We divide core defences in web applications into three areas: Handling User Access, Handling User Input, and Handling Attackers. These are explained as following below.… Read More »

RSA algorithm is an asymmetric cryptography algorithm which means, there should be two keys involve while communicating, i.e., public key and private key. There are… Read More »

ElGamal encryption is an public-key cryptosystem. It uses asymmetric key encryption for communicating between two parties and encrypting the message. This cryptosystem is based on… Read More »

Classical Cryptography – The earliest known use of Cryptography can be dated back to 1900 BCE during the time of Old Kingdom of Egypt in… Read More »

Cryptography is the study and practice of techniques for secure communication in the presence of third parties called adversaries. It deals with developing and analyzing… Read More »

Definition: In Cryptography, SHA is cryptographic hash function which takes input as 20 Bytes and rendered the hash value in hexadecimal number, 40 digits long… Read More »

Prerequisite – Birthday paradox Birthday attack is a type of cryptographic attack that belongs to a class of brute force attacks. It exploits the mathematics… Read More »

Cryptography can be defined as an art of encoding and decoding the patterns (in the form of messages). Cryptography is a very straightforward concept which… Read More »

Data encryption standard (DES) has been found vulnerable against very powerful attacks and therefore, the popularity of DES has been found slightly on decline. DES… Read More »

Cryptography is an important aspect when we deal with network security. ‘Crypto’ means secret or hidden. Cryptography is the science of secret writing with the… Read More »

AES and DES are both examples of symmetric block ciphers but have certain dissimilarities.

The two types of traditional symmetric ciphers are Substitution Cipher and Transposition Cipher. The following flowchart categories the the traditional ciphers: 1. Substitution Cipher: Substitution… Read More »