A Brief History of Cryptography: From Art to Science

A Brief History of Cryptography: From Art to Science

In May 2017, the WannaCry ransomware virus broke out globally, with some university students in mainland China reporting that their computers were attacked by the virus and documents were maliciously encrypted. The ransomware wreaked havoc, resembling a global internet disaster, causing significant losses to computer users. According to the latest statistics, over 100 countries and … Read more

The Birth of Asymmetric Encryption

The Birth of Asymmetric Encryption

Click the blue text Follow us The Birth of Asymmetric Encryption Tree Brother: Cryptography can be simply divided into classical cryptography and modern cryptography. We have already introduced substitution ciphers and the Enigma machine in classical cryptography, and now we will begin to discuss symmetric and asymmetric encryption methods in modern cryptography. I’m sure you … Read more

Understanding HTTPS and Its Encryption Principles

Understanding HTTPS and Its Encryption Principles

HTTPS (full name: Hypertext Transfer Protocol Secure, is a secure version of HTTP designed with security in mind. This article will delve into its principles. 1 Why HTTPS is Necessary The reason for using HTTPS is quite simple: it is due to the insecurity of HTTP. When we send sensitive data to a server (such … Read more

Understanding The Underlying Principles Of Cryptography In 3000 Words

Understanding The Underlying Principles Of Cryptography In 3000 Words

1. Definition of Cryptography Before the late 20th century, cryptography was more of an art, primarily used for secret communication. At that time, there were no theories to rely on, nor any effective definitions to construct a good cipher. It wasn’t until the 1980s that the emergence of modern cryptography transformed the study of cryptography … Read more

Introduction to Information Security and Cryptography

Introduction to Information Security and Cryptography

This article provides a preliminary understanding of the field of information security. 1. Briefly describe security attacks, security mechanisms, and security services. Security attack: Any act that jeopardizes the security of an information system. Security mechanism: A process used to detect, prevent attacks, or recover from an attack state to a normal state. Security service … Read more

Understanding The Technical Foundations Of Privacy Computing

Understanding The Technical Foundations Of Privacy Computing

“IT Chat” is a professional information and service platform under the Machinery Industry Press, dedicated to helping readers master more professional and practical knowledge and skills in the broad field of IT, quickly enhancing workplace competitiveness. Click on the blue WeChat name to follow us quickly. Secure Multi-Party Computation Before discussing secure multi-party computation (hereafter … Read more

20 Lines of Python Code for Encrypted Communication

20 Lines of Python Code for Encrypted Communication

1. Introduction The internet is filled with eavesdropping, and our information can easily be obtained by malicious individuals, causing us negative impacts. If you need to transmit confidential or sensitive personal information over the internet, you may need to encrypt it to guard against prying eyes. Using online or mobile encryption software may also expose … Read more

Public Key Encryption Based on Large Prime Numbers – RSA Algorithm

Public Key Encryption Based on Large Prime Numbers - RSA Algorithm

Follow Encounter Mathematics, and discover a more wonderful you Image from: https://slideplayer.com/slide/5369780 The following text is excerpted from “Mathematics Kaleidoscope 2”, with permission from People’s Post and Telecommunications Press, [Encounter Mathematics] expresses gratitude! Modular arithmetic has led to an important development in cryptography: public key encryption. All cryptography relies on keys, and the greatest risk … Read more

Understanding 3DES Encryption Algorithm

Understanding 3DES Encryption Algorithm

3DES is the common name for the Triple Data Encryption Standard. It is an enhanced version of the DES algorithm, equivalent to applying the DES operation three times to each data block. Due to the increased key length, the security level and difficulty of cracking are higher than that of the DES algorithm. The encryption … Read more

Understanding RSA Algorithm Principles (Part 2)

Understanding RSA Algorithm Principles (Part 2)

Last time, the author introduced some number theory knowledge. With this knowledge, we can understand the RSA algorithm. This is currently the most important encryption algorithm on Earth. 6. Steps for Key Generation We will understand the RSA algorithm through an example. Suppose Alice wants to communicate securely with Bob, how should she generate her … Read more