Cryptography

Decrypting Downloaded Files

Introduction to Malware Command and Control Malware authors commonly design their malware to communicate with their operators.  In some cases, these command

Introduction to hash functions

Hash functions are the most commonly used mathematical functions in cryptography for implementing security. A hash function converts an input value of any ar

Introduction to Asymmetric Cryptography

Cryptography uses symmetric and asymmetric encryption for encryption and decryption of data. In this post, we will be focusing on and discussing asymmetric e

The Advanced Encryption Standard (AES)

Advanced Encryption Standard short formed as AES falls under the symmetric encryption category. Thus, in AES the sender and the recipient of the data uses t

Fundamentals of symmetric and asymmetric cryptography

Cryptography uses symmetric and asymmetric encryption for encryption and decryption of data. If the sender and the recipient of the data use the same key to

Case Studies in Poor Password Management

Introduction In essence, a password is a cryptographic secret that needs proper storage and management. Even for individual users this can be a difficult ta

The ultimate guide to encryption key management

In cryptography, a key is a very important piece of information used to combine with an algorithm (a cipher) to transform plaintext into ciphertext (encrypti

Principles of cryptography

In layman’s terms, cryptography is the encryption and decryption of a written or text message between two parties. The practice relies on ciphers — a set of

Encryption vs Encoding

Encryption and decryption Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text

Introduction to Cryptanalysis

What is cryptanalysis? Cryptography is the science of creating codes or keeping this secret. Cryptanalysis is the opposite: the attempt to break the code, g