Skip to content

Cryptography

Hashing Algorithm

    The first concept we need to discuss in our exploration of Cryptography is that of a Hashing Algorithm. A Hashing Algorithm is a mathematical formula that takes a Message of arbitrary length as input and… Read More »Hashing Algorithm

    Message Integrity

      In the world of secured communications, Message Integrity describes the concept of ensuring that data has not been modified in transit. This is typically accomplished with the use of a Hashing algorithm.  We learned earlier what a Hashing Algorithm… Read More »Message Integrity

      Confidentiality

        Confidentiality is the concept of hiding or scrambling your data so that only the intended recipient has access. This is typically accomplished by some means of Encryption. Data before it has been encrypted is referred to as Plain text,… Read More »Confidentiality

        Symmetric Encryption

          We learned earlier that Symmetric encryption is an encryption scheme that encrypts and decrypts using the same secret key. Now we will explore a bit further into what that involves. Let’s start with a simple example:… Read More »Symmetric Encryption

          Asymmetric Encryption

            Earlier, we learned that Symmetric encryption is an encryption scheme that uses the same key to encrypt and decrypt. Conversely, Asymmetric encryption, uses different keys to encrypt and decrypt. Lets take a look at a simple example.… Read More »Asymmetric Encryption

            Using Asymmetric Keys

              We’ve established how Asymmetric encryption makes use of two mathematically linked keys: One referred to as the Public Key, and the other referred to as the Private Key. We’ve also established that what one key encrypts,… Read More »Using Asymmetric Keys

              Authentication

                In Cryptography, the concept of Authentication serves to provide proof that the other side of a communication is indeed who they claim to be, and who you intend for them to be. There are multiple… Read More »Authentication

                Anti-Replay

                  The Problem Before we can describe the solution, we must first adequately describe the problem Anti-Replay is trying to solve. Imagine your local bank branch office.  Imagine someone going to that branch location, and depositing $100… Read More »Anti-Replay