-
How to implement the Vigenère cipher in python
Read moreAnother substitution cipher is the Vigenère cipher. In this post, I give you an explanation of the cipher and a python implementation. The Vigenère cipher is categorized under polyalphabetic substitution ciphers. This type of cipher works as follows[1]: They use related monoalphabetic substitution rules. The key is used to determine what rule to apply for […]
-
How to implement the Hill Cipher in Python?
Read moreThe Hill cipher is a multi-letter cipher. It is based on Linear Algebra operations, specifically matrix operations. It was created in 1929 by the mathematician Lester Hill. Some concepts you might want to revisit are matrix multiplication and inversion. The Hill cipher To encrypt a text with the Hill cipher, we have to encrypt three […]
-
How to create secure keys for symmetric encryption?
Read moreSecure keys creation is a topic of utmost importance in Cryptography and Network Security. The stronger the keys the better, the more secure your data will be. But, how to create strong keys/passwords? In classic cryptography, we were expected to create the keys used for encryption. For instance, Caesar Shift Cipher uses an integer number […]
-
What is key length in cryptography and why is important?
Read moreIn cryptography, we secure a message by encrypting the message with a certain key and then sending it over the network. The security of the encryption usually depends on the key length. In this article, I’ll show why key length is a very important topic in cryptography. Key length (a.k.a. key size) is the number […]
-
How to implement the Playfair cipher in python?
Read moreThe Playfair cipher is a multiple letter encryption cipher that uses a substitution technique. The steps to implement it are as follows: Create a 5×5 matrix using the secrete key. In this matrix, I and J are in the same cell. you start filling the matrix with the key, then you use the alphabet. Letters […]
-
Python implementation of the Caesar cipher
Read moreThe Caesar cipher is an encryption technique used by Julius Caesar to send communications that had military importance for his empire. Today is a technique that is studied in Cryptography under the classification of substitution ciphers, a topic that at the same time is under classic cryptography. It is also known as a shift cipher, […]
-
OpenPGP: Encryption and digital signature using GpgFrontend
Read moreThis article explains what is OpenPGP and how to use it to encrypt and sign documents. You will understand how this standard works and the foundations of the security of hybrid cryptography systems. What is PGP, OpenPGP and GPG? Pretty Good Privacy (PGP) is an encryption system that combines symmetric and asymmetric algorithms for encryption […]
-
Understanding symmetric cryptography through the study of several ciphers
Read moreSymmetric cryptography is about algorithms that use the same keyword to encrypt and decrypt information. These algorithms, also called ciphers, are efficient to encrypt high volumes of data. The goal of this type of algorithm is to achieve confusion and diffusion in the encrypted text. In this way, the results seem to be random. Cryptographic […]
-
AES and GOST: Modern Symmetric Cryptography
Read moreModern Cryptography uses complex algorithms to encrypt information. These algorithms can be classified as symmetric and asymmetric. AES and GOST are two of the modern symmetric cryptographic algorithms. You can find an explanation of symmetric and asymmetric algorithms in the article General Concepts to study Cryptography. The security principles of modern cryptography symmetric algorithms are […]