Cryptography

Secure Credential Management

Securely storing credentials Passwords are the most popular method for implementing an authentication system despite their security issues. As a result, a c

Introduction to Blockchain

What is blockchain? A blockchain is a record of digital transactions. It is a distributed software network which can function both as a digital ledger and a

Blockchain Technology

Introduction to blockchain Blockchain is a technology that has gained a great deal of attention in recent years. The goal of a blockchain network is to crea

Virtual Private Networks (VPNs)

Introduction to VPNs Virtual Private Networks (VPNs) are a solution designed to provide a secure connection between two parties over an untrusted network. T

Public Key Infrastructure: Architecture & Security

Introduction to PKI The internet and many other digital systems rely upon public key infrastructure (PKI) to manage trust within a system. PKI includes a nu

Hash Functions

Introduction to hash functions Hash functions are unique because they use cryptographic primitives and principles but are not cryptographic algorithms. Unli

Asymmetric Cryptography

Introduction to asymmetric cryptography Asymmetric cryptography differs from symmetric cryptography in that it uses two encryption keys: a public key and a

Fundamentals of Cryptography

Introduction Cryptography can seem complex, but a lot of cryptography boils down to some very simple mathematical operators and structures. In this article,

Symmetric Cryptography

Introduction to symmetric cryptography Symmetric cryptography gets its name from the fact that the same secret key is used for encryption and decryption, th

Introduction to cryptography

The field of cryptology Cryptology — literally “the study of secrets” — is composed of cryptography (making codes) and cryptanalysis (breaking codes). Howev