malware
Malware, short for “malicious software,” includes any software (such as a virus, Trojan, or spyware) that is installed on your computer or mobile device. The software is then used, usually covertly, to compromise the integrity of your device. Most commonly, malware is designed to give attackers access to your infected computer. That access may allow others to monitor and control...
Asymmetrical Encryption Example
From time to time we hear the word encryption. So, what exactly is encryption? According to Wikipedia, encryption is: In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Nowadays, there are two well-known types of encryption algorithms used to encrypt data....
http vs https
Whenever you are browsing, you have probably noticed either HTTP:// or https:// in the address bar of a browser. To put it simply, both of these are protocols through which the information of a particular website is exchanged between the Web Server and the Web Browser. What’s the difference between these two? What is HTTP? HTTP stands for Hypertext Transfer Protocol. It allows...
encryption software tools
What are some of the best encryption software tools ready for taking? As you well know that encryption is the best way to keep your digital information secure. So what does data encryption mean? It’s simply the use of a key and an algorithm to make data and information inaccessible to third parties. In order to access the original message and meaning one...
replay attack
A replay attack occurs when an attacker taps into a secure network communication, intercepts it, and then fraudulently delays or resends it. It is also known as a playback attack. The aim of the attacker is to misdirect the recipient into doing what he wants. Replay attacks help attackers to gain access to a network, gain information which would not have been...
simple substitution cipher
What are various methods of solving substitution ciphers. A substitution cipher replaces each letter in the alphabet with another symbol. These symbols could be letters, numbers, arcane symbols, lines and dots, and unknown squiggles. Are you interested in finding out more about ciphers and codes? The Codebreakers – The Story of Secret Writing book by David Kahn is what I would start with. Here...
Sometime we like to send a secret message to a friend that only they can understand. So, how can we do that without going to trouble of creating our own secret language. Actually, it is very simple. By using a cipher wheel. A cipher wheel replaces each letter of your message you want to send with another further along the alphabet. It is also...
hashing vs encryption
From time to time, people are fond of using hashing and encryption interchangeably. Nevertheless, the truth is these two words mean completely different things. What are some of the differences between the two, and the situations in which you should use one over the other? This is a comparison between hashing vs encryption. Hashing vs Encryption In this guide, I will be discussing the...
rsa vs dsa
RSA and DSA are most common encryption algorithms in cryptography. Both of these encryption systems are used for data encryption. Although both RSA and DSA work in a similar manner, there are specific differences between the two. This is a comparison between RSA vs DSA. RSA vs DSA In this guide I will be discussing the following: Difference between RSA and DSA. Difference between RSA...
rsa algorithm
RSA algorithm is a cryptosystem for public-key encryption that is widely used for securing sensitive data when being sent over an insecure network such as the internet. The RSA algorithm is named after Ron Rivest, Adi Shamir and Len Adleman, who invented it in 1977. The basic idea had been discovered in 1973 by Clifford Cocks of CESG, but remained a...
vernam cipher
Vernam cipher is a symmetrical stream cipher in which the plaintext is combined with a random or pseudorandom stream of data of the same length, to generate the ciphertext, using XOR function. To put is simply, vernam cipher is based on the principle that each plaintext letter from a message is combined with one character from a key stream. Read:...
adfgvx cipher
ADFGVX cipher is a fractionating transposition cipher that uses 6 by 6 square grid to replace the plaintext by pairs of letters among A, D, F, G, V, X and then this ciphertext get a permutation of its letters. ADFGVX cipher combines an adapted Polybius Square with Columnar transposition, similar to trans-positing fractionated text. To put is simply, in ADFGVX cipher,...