Md. Sadiqmdsadiqmd.hashnode.dev·Jul 14, 2024Cryptography and Digital SignaturesIntroduction On the Internet, we try to send data between two nodes, users, or machines, but there is always an underlying threat of information or data leaks, generally termed as Man-in-the-Middle attack. Thus, cryptography comes into the picture. E...2 likes·42 readsdigital-signature
Aazaraazar.hashnode.dev·May 14, 2024Beating the Rubber Hose CryptanalysisAlright folks, gather around because I’m about to take you on a journey that starts in the mundane world of everyday coding and ends in the deep, thrilling abyss of deniable encryption. This isn’t just a story about code – it’s about paranoia, privac...111 readsDefence Against the Dark ArtsCryptography
Guillaume Lethuillierglthr.com·Mar 30, 2024A Fresh Perspective on Kryptos K4, the Decades-Old Unsolved Code↘ This article presents our recent discovery of a pattern in Kryptos K4, the famous unsolved code. This potential breakthrough may reveal the use of a distinctive encryption technique. We also present “K4nundrum”, an open-source tool we created to ex...1.6K readsciphers
Krishna Koltetech.krishnadk.me·Mar 12, 2024Kocher's Timing AttackIn part 2 of the Cryptanalysis and Side-Channel Attack Series, we will perform a simulated attack on the famous RSA encryption algorithm. Even though the real-time and the simulated attacks differ greatly, the simulated attack will give us a deeper u...10 likes·27 readsCryptanalysis and Side-Channel AttacksCryptography
Krishna Koltetech.krishnadk.me·Mar 2, 2024Understanding Cryptanalysis and Side-Channel AttacksCryptanalysis In the world of cryptology, there is a creator force and a destroyer force. They together build the foundation of the cryptographic systems we see around us. Cryptography focuses on creating secret codes, unique patterns and not-so-intu...10 likesCryptanalysis and Side-Channel Attackscryptanalysis