Advanced Search
Search Results
651 total results found
Unit XI
Unit XII
Unit XIII
Unit XIV
Unit 3
Overview of Cryptography
The process of writing or solving messages using a secret code. This would be the proper definition of cryptography. However, in computer systems, there is never true secrecy. The existence of information can always be detected on a computer system, one way o...
Asymmetric Encryption
Where encryption and decryption are handled by two different keys. A user will generate a keypair when they want to use asymmetric encryption. One will be public, and the other will be private. The public key will be used to encrypt message being sent to the ...
Rivest-Shamir-Adleman
A commonly used asymmetric encryption algorithm used for creating digital signatures.
Elliptic Curve Cryptography
A more modern asymmetric encryption algorithm. ECC is able to generate smaller keys and is more secure than other methods. It's being used today to secure websites, their connections, and their data transmissions.
Diffie-Hellman
An asymmetric encryption algorithm created to let two users that are stranger to each other to safely create a shared key over a public channel (like the Internet). The Diffie-Hellman exchange process is as follows: The two users agree on a prime number $P...
Digital Signature Algorithm
A more modern asymmetric encryption algorithm.
Stream Ciphers
A symmetric encryption method that encrypts data one bit at a time. The stream cipher is based on the one-time pad (OTP) concept that was popular back in WWII days. OTP Characteristics The OTP is a symmetric cipher that uses a secret key to encrypt and decr...
Block Ciphers
A symmetric encryption algorithm that encrypts data in set chunks, with varying chunk sizes. Common sizes range from 64, 128, and 256 bits of length. Notice something? Something about all of them being powers of 2? You know, $2^6$, $2^7$, and $2^8$? When the ...
Blockchain
A unique and increasingly popular implementation of cryptography that was developed in 2008. Blockchain itself is described as the method that a continuously expanding list of transactions are secured using cryptography. In blockchain, each additional record ...
Cryptographic Attacks
There is no such thing as a sure thing when it comes to protecting data stored on computer systems. Encrypting data is only ever relatively secure, but hackers always have a chance of gaining access to encrypted data using a variety of methods. Dictionary At...
GNU Privacy Guard
An encryption tool that encrypts emails, digitally signs them, and also encrypts documents. GPG was an implementation of the Pretty Good Privacy (PGP) protocol. However, PGP is now owned by some random company that will go unnamed. They both follow the OpenPG...
NeepMeat 4fecta
The beginning of a documentation on the new, popular, hit Minecraft modpack NeepMeat 4fecta.
Guides
A collection of beginner guides to processes and concepts in the new hit Minecraft modpack NeepMeat 4fecta.