Cryptography

Cryptanalysis tools

Some terms and definitions Alice – Sender of the message Bob – Receiver Eve – Eavesdropper or unintended party Plaintext – Message to be sent

Cracking a WPA2 encryption password file

In this article will learn how you can crack WPA2 encryption password file. How to secure Wi-Fi? If you want to secure 100% wireless network, then the best

Steganography - Don’t judge a book by its cover

Steganography is the art of hiding data in hiding data within non-secret text or data. A file, message, image, or an audio file can can be concealed within a

Mathematical algorithms of asymmetric cryptography and an introduction to public key infrastructure

Learn what's involved in asymmetric cryptography, including the mathematical algorithms used and the public key infrastructure.

A Review of Asymmetric Cryptography

Introduction Our last article further examined and finished off the topic of Symmetric Cryptography. Specifically, the following topics were examined:

An introduction to the key distribution center, mathematical algorithms, and the hashing function

Our last article reviewed some of the key fundamentals of Cryptography, especially what has been used in the past. Specifically, it covered the following top

An Examination of the Caesar Methodology, Ciphers, Vectors, and Block Chaining

Overview of the Last Article In today's world, communications of all types and kinds are becoming of utmost importance. Whether it is from personal to profes

A brief summary of encryption method used in widespread ransomware

Try to describe encryption method in such a simple way that everyone can understand it easily. 1.1 Ransomware Ransomware is a kind of computer malware that

A Review of Cryptography

Overview of Last Articles Our last few articles have dealt with the science and technology of Biometrics. To review, it is merely the Verification and/or Id

Public Key Infrastructure: Concepts & Lab Setup

Executive Summary This article is a detailed theoretical and hands-on with Public Key Infrastructure (PKI) and OpenSSL based Certificate Authority. In the f