If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees.
— Kahlil Gibran
One of the biggest news/scandals nowadays involving tech companies are usually related to data breaches. A data breach is referred as an event in which someone steal or get access to information without the consent of the owner of such information.
In the technology sector, we use Cryptography to keep secrets, together with other techniques and services deployed in our electronic devices.
In this blog, you can find the foundations of current cryptography practices as well as techniques and software related to Network Security.
If you are new to cryptography, I recommend you to start here:
You can also browse to several categories using the menu, or you can find them below.
Information Security ↗
Find out the similarities between a computer security system and a physical protection system to facilitate its understanding.
Symmetric ↗
Symmetric cryptography is about algorithms that use the same keyword to encrypt and decrypt information.
Asymmetric ↗
Asymmetric algorithms are very important in cryptography and especially in digital signatures.
Keys ↗
In cryptography, we secure a message by encrypting the message with a certain key and then sending it over the network.
Digital Certificates ↗
We can use a Digital Certificate to share a public key. That public key can then be used to start a secure …
Digital Signature ↗
A digital signature is a mechanism we can use to verify the authenticity of a message/document.
Hash Functions ↗
A cryptographic hash function is an algorithm that has two main properties: it is a one-way function and is collision-free.
Network Security ↗
Network Security is about protecting your network from data breaches, intrusions, etc. Find out more about tools and techniques …
Notice that some articles falls into more than one category.
“A cryptographic system should be secure even if everything about the system, except the key, is public knowledge.”
— Auguste Kerckhoffs
Latest posts
- What ports are secure in your computer?In information security, we consider secure ports those that encrypt the communication, or all the data that passes through them. But, you need to be… Read more: What ports are secure in your computer?
- What are insecure ports in your computer?Informally, insecure ports are ports that do not encrypt the communication that occurs through that port. Ports in a computer are a virtual place where… Read more: What are insecure ports in your computer?
- What is phishing in cybersecurity?Phishing attacks are one of the most common cybersecurity attacks. The attack is meant to steal information by deceiving users. It is carried out by… Read more: What is phishing in cybersecurity?
- One-Time Pad cipher in PythonThe One-Time Pad cipher was proposed by Joseph Mauborgne. In this post, I’ll show you a Python implementation of this cipher. This cipher is the… Read more: One-Time Pad cipher in Python
- Vernam cipher in PythonVernam cipher was introduced by Gilbert Vernam in 1918. In this post, I’ll explain the algorithm and show the implementation in Python. Vernam cipher is… Read more: Vernam cipher in Python
- The 7 tenets of zero trust (NIST SP 800-207)The 7 tenets of zero trust provided in NIST SP 800-207, are an attempt to define what should be included in a zero trust architecture… Read more: The 7 tenets of zero trust (NIST SP 800-207)