Himanshu Rajhimanshuraj05.hashnode.dev·Jun 30, 2024Confusion vs Diffusion in cryptographyThe the theory of confusion and diffusion was given by Claude Shannon. Confusion and diffusion are both cryptographic techniques that are used to stop the deduction of the secret writing key from the attacker. The major differences between confusion ...DiscussCryptography
Guillaume Lethuillierglthr.com·Mar 30, 2024A Fresh Perspective on Kryptos K4, the Decades-Old Unsolved Code↘ This article presents our recent discovery of a pattern in Kryptos K4, the famous unsolved code. This potential breakthrough may reveal the use of a distinctive encryption technique. We also present “K4nundrum”, an open-source tool we created to ex...Discuss·498 readsciphers
Keshav Carpenterblog.keshavcarpenter.tech·Mar 18, 2024Choosing the Right Cipher Algorithm and Mode for Secure Encryption in JavaWhen it comes to encrypting sensitive data in Java, the choice of cipher algorithm and mode can significantly impact the security of your application. In this post, we'll explore common pitfalls associated with certain cipher modes and algorithms, an...Discussencryption
K Koyalbinarybelle.hashnode.dev·Nov 29, 2023🔑Cryptography and 🌐Network 🛡️Security | Unit 1🥸Introduction to Computer Security Concepts Computer security refers to measures and controls that ensure the confidentiality, integrity, and availability of the information processed and stored by the computer. This includes everything from prote...Discuss·1 like·65 readshillcipher
Nur Kholis M.kholis.hashnode.dev·Oct 17, 2023NiFi: NiFi 1.23.x issues with weak ciphers/encryption typesIssues After upgrade to NiFi 1.23.1 our nifi instances is failed to starting up with these error messages: Error #1 tail -f /var/log/nifi/nifi-app.log Caused by: sun.security.validator.ValidatorException: PKIX path validation failed: java.security.ce...Discussapache nifi
Stackzerostackzero.hashnode.dev·Aug 14, 2023Secret Codes Unlocked: How to Implement Substitution CiphersAre you ready to implement substitution ciphers with your own hands and take your encryption skills to the next level?In our previous article, we explored the fascinating world of substitution ciphers and how we can use them to encode our secret mess...Discuss·1 like·59 readsCryptography
Shreyas K Sblog.themissingsemicolon.dev·Sep 23, 2022Block Ciphers - Modes Of OperationModes Of Operation Electronic Codebook Mode (ECB) Cipher Block Chaining Mode (CBC) Counter Mode (CTR) Electronic Codebook Mode - (ECB) ECB is one of the most insecure and simplest modes of operation in BlockCipher. All blocks in plaintext (P1, P2....DiscussBeyond The BypassedCryptography