Tags » Cryptography

Modern Cyptography (Behind the scenes )

Cyrptogaphy is a good way to stay safe online and offline.Every message that you send over platform such as WhatsApp,Viber,Facebook,Instagram is encrypted with also called “powerful algorithms” such as “End-to-End” encryption.By the way the NSA declared that was able to break part of that encryption.Edward Snowden revelations showed to us that NSA is able to break every encryption so its hard to believe that they can’t break it entirely.This is a huge problem for our privacy.Don’t forget  “ 264 more words

Security Analysis of AES and Enhancing its Security by Modifying S-Box with an Additional Byte

Abdullah Al- Mamun1 , Shawon S. M. Rahman, Ph.D.2 , Tanvir Ahmed Shaon1  181 more words

Network Architectures

Java cryptography extension for libsodium

Sodium is a modern crypto-library for encryption, decryption, signatures, password hashing and more.

So, I’ve decided to write an extension according to the specification. 55 more words


Hill climbing on substitution ciphers

On Saturday the BSHM held a fascinating meeting The history of cryptography and codes. In the second talk, Solving Historical Ciphers with Modern Means… 980 more words

Symmetric Group

PRNG Tests Using the Now Superseded FIPS 140-1 by James Pate Williams, Jr., BA, BS, MSwE, PhD

This blog post is dedicated to Section 5.3.1 ANSI X9.17 generator page 173 with 5.11 Algorithm and Section 5.4.4 Five basic tests pages 181-183 especially 5.32 Note of the… 624 more words

Computer Science

Triple-AES Stream Cipher Using the ANSI X9.17 Pseudorandom Number Generator (PRNG) by James Pate Williams, Jr. BA, BS, MSwE, PhD

The Advanced Encryption Standard (AES) is fully described in the National Institute of Standards and Technology (NIST) publication:


AES is a secret key block cipher with a block length of 128-bits and variable key lengths of 128-bits, 192-bits, and 256-bits. 146 more words

Computer Science