Skip to content

Hashing Algorithm

    The first concept we need to discuss in our exploration of Cryptography is that of a Hashing Algorithm. A Hashing Algorithm is a mathematical formula that takes a Message of arbitrary length as input and… Read More »Hashing Algorithm

    Message Integrity

      In the world of secured communications, Message Integrity describes the concept of ensuring that data has not been modified in transit. This is typically accomplished with the use of a Hashing algorithm.  We learned earlier what a Hashing Algorithm… Read More »Message Integrity

      Symmetric Encryption

        We learned earlier that Symmetric encryption is an encryption scheme that encrypts and decrypts using the same secret key. Now we will explore a bit further into what that involves. Let’s start with a simple example:… Read More »Symmetric Encryption

        Confidentiality

          Confidentiality is the concept of hiding or scrambling your data so that only the intended recipient has access. This is typically accomplished by some means of Encryption. Data before it has been encrypted is referred to as Plain text,… Read More »Confidentiality

          Mission Statement

            If you can’t explain it to a six year old, you don’t understand it yourself. –Albert Einstein The truest test to determine whether you know something or not is to try to explain it to… Read More »Mission Statement