Understanding Block Ciphers: A Comprehensive Overview

Understanding Block Ciphers: A Comprehensive Overview

Reliable and Efficient: The Block Cipher Written by | Teacher Kang In the previous five issues, we discussed the intrinsic characteristics and structures of cryptography, as well as the relationship between cryptography and security. Starting from this issue, we enter the second part of this series – the

Introduction to Commercial Cryptographic Algorithms

Introduction to Commercial Cryptographic Algorithms

Commercial cryptographic technology refers to the technology that can implement encryption, decryption, and authentication functions of commercial cryptographic algorithms (including programming technology for cryptographic algorithms and implementation technologies for cryptographic algorithm chips, encryption cards, etc.). Commercial cryptographic technology is the core of commercial cryptography, and the state has classified commercial cryptographic technology as a national … Read more

Organizing Notes | Team Learning Cryptography Session 6: Basics of Cryptographic Mathematics – Finite Fields

Organizing Notes | Team Learning Cryptography Session 6: Basics of Cryptographic Mathematics - Finite Fields

1. Operations In simple terms, a group ring field is a collection with operations. Let’s first look at some content related to operations. An operation is actually a mapping from one set to another: We call an operation involving n operands an n-ary (target) operation; specifically, if n=2, it is called a binary operation. At … Read more

Understanding Android Signature Versions: v1, v2, v3, and v4

Understanding Android Signature Versions: v1, v2, v3, and v4

This article is authored by Jiu Xin, originally published at: Jiu Xin Says. Introduction Recently, I helped the testing team with some signature-related requirements, and today I would like to briefly discuss the topic of signatures with everyone. If you ask why Android needs signatures, everyone might think of the official explanation: ❝ The Android … Read more

Hybrid Encryption Scheme Based on Elliptic Curves (ECIES)

Hybrid Encryption Scheme Based on Elliptic Curves (ECIES)

0 Introduction With the help of ECC (Elliptic Curve Cryptography), we can utilize the powerful capabilities of public key encryption while achieving the speed and security of symmetric encryption. Therefore, we gradually turn to practical scenarios, focusing on the following categories: (1). Public Key Key Exchange Protocols: ECDH (P256), ECDH (P384), ECDH (P521), X25519 and … Read more

Research and Implementation of RSA Encryption Algorithm Improvement

Research and Implementation of RSA Encryption Algorithm Improvement

Research and Realization of the RSA Encryption Algorithm Improvement YU Xin–hong,CHEN Qi,YAN Yu (Economy and Technology Institute, Anhui Agricultural University, Hefei, Anhui 230011, China) Abstract:The modular exponentiation and modular multiplication are essential elements to secure RSA algorithm. However, modular exponentiation has been so time-intensive that it impedes RSA algorithm’s application. Therefore, it is paramount to … Read more

Overview of Searchable Encryption Technology

Overview of Searchable Encryption Technology

Abstract Searchable encryption technology is a method for protecting user privacy, widely applied in data sharing, cloud computing, and location privacy protection. This article mainly introduces the basic knowledge, implementation methods, security threats, application scenarios, and future development directions of this technology. The article first introduces the concept of searchable encryption, then discusses existing symmetric … Read more

Understanding RSA Algorithm Principles (Part 1)

Understanding RSA Algorithm Principles (Part 1)

If you ask me, which algorithm is the most important? I might answer “Public Key Encryption Algorithm“. Because it is the cornerstone of computer communication security, ensuring that encrypted data cannot be cracked. You can imagine the consequences if credit card transactions are compromised. Before getting into the main topic, let me briefly introduce what … Read more

Obfuscation Techniques: The Safest Way to Encrypt Code

Obfuscation Techniques: The Safest Way to Encrypt Code

For decades, computer scientists have sought to verify whether there exists an absolutely secure method to encrypt computer programs, rendering them uncrackable during use. At the end of 2020, several scholars successfully discovered an encryption method that prevents computer users from cracking programs by obtaining the code. Encrypting Program Code First, It Must Be Obfuscated … Read more

Digital Signature Algorithm (DSA) in Cryptography: How It Works and Its Advantages

Digital Signature Algorithm (DSA) in Cryptography: How It Works and Its Advantages

The COVID-19 pandemic has made remote working the new norm and brought the business world into a phase that is yet to be explored. Undoubtedly, due to the lack of face-to-face interaction and standard distance restrictions, many users have had to digitally sign some official documents over the past few years. To maintain the authenticity … Read more