Cyrptogaphy is a good way to stay safe online and offline.Every message that you send over platform such as **WhatsApp,Viber,Facebook,Instagram **is encrypted with also called “powerful algorithms” such as “End-to-End” encryption.By the way the NSA declared that was able to break part of that encryption.Edward Snowden revelations showed to us that NSA is able to break every encryption so its hard to believe that they can’t break it entirely.This is a huge problem for our privacy.Don’t forget “ 264 more words

## Tags » Cryptography

#### Modern Cyptography (Behind the scenes )

Security Analysis of AES and Enhancing its Security by Modifying S-Box with an Additional Byte

**Abdullah Al- Mamun1 , Shawon S. M. Rahman, Ph.D.2 , Tanvir Ahmed Shaon1 ** 181 more words

#### Mathematics in Cryptography

…

Some relevant links:

Caesar cipher.

Substitution cipher.

Frequency analysis.

Vigenère cipher.

ADFGVX cipher.

One-time pad.

Arthur Scherbius. 25 more words

#### Java cryptography extension for libsodium

Sodium is a modern crypto-library for encryption, decryption, signatures, password hashing and more.

So, I’ve decided to write an extension according to the specification. 55 more words

#### Hill climbing on substitution ciphers

On Saturday the BSHM held a fascinating meeting The history of cryptography and codes. In the second talk, *Solving Historical Ciphers with Modern Means…* 980 more words

#### PRNG Tests Using the Now Superseded FIPS 140-1 by James Pate Williams, Jr., BA, BS, MSwE, PhD

This blog post is dedicated to Section 5.3.1 ANSI X9.17 generator page 173 with 5.11 Algorithm and Section 5.4.4 Five basic tests pages 181-183 especially 5.32 Note of the… 624 more words

#### Triple-AES Stream Cipher Using the ANSI X9.17 Pseudorandom Number Generator (PRNG) by James Pate Williams, Jr. BA, BS, MSwE, PhD

The Advanced Encryption Standard (AES) is fully described in the National Institute of Standards and Technology (NIST) publication:

https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf

AES is a secret key block cipher with a block length of 128-bits and variable key lengths of 128-bits, 192-bits, and 256-bits. 146 more words