Theory of Cryptography
Introduction to Cryptography
Introduction to ciphers, that is a short history of the first encryption means and the basic principles of modern cryptography.
Read MoreKerckhoffs's Principle
The Kerckhoffs's principle is one of the most basic and most important principles of modern cryptography. It was first published in 1883 in France.
Read MoreSteganography
Steganography is a way of securing data, by simply hiding it. Learn its history and the various methods that are used at present.
Read MoreProtocols
Protocol are sets of actions that should be performed in order to accomplish the goals. They are essential in almost all cryptographic operations.
Read MoreTCP/IP Protocols
TCP/IP protocols are probably the most popular protocols used in computer networks. Learn how to build and process TCP/IP messages in different layers of the network.
Read MoreApplication Protocols
Application layer protocols operate in the highest layer of the network model. They create interfaces available to applications.
Read MoreNotation of Numbers
Notation of numbers are ways of representing the numbers. They are necessary for all further mathematical operations.
Read MoreBinary Numbers
Binary numbers are used by all computers all around the world. Learn the most popular binary systems and the most common mathematical operations.
Read MoreTime Estimation
Time estimation of basic mathematical operations is necessary for assessing and improving the quality of computer algorithms.
Read MoreModular Arithmetic
Modular arithmetic is a system of arithmetic for integers, where values reset to 0 after reaching a certain predefined value. It is necessary to asymmetric encryption algorithms.
Read MoreSecurity of Ciphers
Assessing cipher quality: Perfect Security and Semantic Security definitions, descriptions, and examples.
Read MorePadding
Padding standards are mechanisms for appending some predefined values to messages. They are required by many algorithms, including block symmetric ciphers.
Read MoreBlock Ciphers Modes
Using various modes of operation of block ciphers allow to operat on large data streams, without the risk of compromising the provided security.
Read MorePseudorandom Generator
Pseudorandom generators (PRG) are used to create random sequences of numbers in deterministic devices. They are extremely important elements of all cryptosystems.
Read MorePseudorandom Functions
Pseudorandom functions and permutations produce pseudorandom data indistinguishable from random sequences. They are used in many cryptographic algorithms.
Read MoreOne-way Function
One-way functions are easy to compute but it is very difficult to compute the value of their inverse functions.
Read MoreMAC
Message authentication code (MAC) algorithms are used for authentication and verification of received messages.
Read MorePBE
Password-based encryption (PBE) algorithms are mechanisms that allow users to create strong and secure secret keys.
Read MoreSoftware Signing
Software signing is used for providing application authorization and preventing any unauthorised modifications of their source code.
Read MoreIndex of Coincidence
The index of coincidence (IC) shows how likely is the situation that during comparing two texts letter by letter, two currently compared letters are the same.
Read More