목록전체 글 (110)
strangerRidingCaml
Advanced TopicsPost-Quantum CryptographyPost-quantum cryptography refers to cryptographic algorithms that are secure against attacks by quantum computers.NTRUEncrypt NTRUEncrypt is a lattice-based public key cryptosystem that is believed to be secure against attacks by quantum computers. Key Generation: Choose parameters \( N, p, q \) where \( N \) is a product of three distinct prime numb..
Cryptographic ProtocolsSecure Communication Protocols SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols used to provide secure communication over a network, typically between a web server and a web browser.Key Establishment Protocols IKE (Internet Key Exchange): Protocol used to establish a shared security association (SA) between two parties, commonly used in IPsec VPNs. ..
Hash Functions and Digital SignaturesCryptographic Hash Functions SHA-2: A family of cryptographic hash functions including SHA-256, SHA-384, and SHA-512. SHA-3: The latest member of the Secure Hash Algorithm family, designed to provide better security and performance than SHA-2.Digital Signatures RSA: A widely-used public-key cryptosystem for secure communication and digital signatures..
Public-Key CryptographyIntroduction to Number Theory Concepts Prime numbers: Numbers that are only divisible by 1 and themselves. Modular arithmetic: Arithmetic operations performed on remainders when divided by a specified modulus.RSA Encryption and Digital Signatures RSA encryption: A public-key encryption algorithm based on the difficulty of factoring large composite numbers. Digi..
Symmetric CryptographySymmetric Encryption Algorithms DES (Data Encryption Standard): A block cipher with a 56-bit key size, widely used but now considered insecure due to its small key length. AES (Advanced Encryption Standard): A block cipher with variable key lengths (128, 192, or 256 bits), currently considered secure and widely adopted.Modes of Operation ECB (Electronic Codebook): ..
Classical CryptographyClassical Ciphers Caesar cipher: A simple substitution cipher where each letter in the plaintext is shifted by a fixed number of positions. Vigenère cipher: A polyalphabetic substitution cipher using a keyword to shift letters in the plaintext.Cryptanalysis Techniques Frequency analysis: Analyzing the frequency of letters or symbols in the ciphertext to deduce patt..