Course Notes: Theory and Basics of Homomorphic Encryption

Abstract:This article is the course notes from Professor Yu Yu’s summer class on homomorphic encryption. Professor Yu is a professor in the Department of Computer Science and Engineering at Shanghai Jiao Tong University, mainly engaged in research related to cryptography. The course first introduces some basic concepts of cryptography, and then discusses some fundamental theories … Read more

Understanding Asymmetric Cryptography Algorithms

Classical cryptography primarily aims to encrypt information, ensuring the confidentiality of the data, with its secret attributes generally based on the proprietary nature of the encryption methods.This indicates that its service target must be a small group, as widespread promotion makes it difficult to ensure the encryption methods are not leaked, and its update cycle … Read more

Symmetric Encryption Algorithms Explained

5Typical Symmetric Encryption Algorithms This article introduces AES, SM4, and ZUC as representatives. AES, the Advanced Encryption Standard, is a block cipher algorithm adopted by the United States federal government; SM4 is a commercial block cipher algorithm developed and promoted for use in China; ZUC, the Zu Chongzhi algorithm, is a stream cipher algorithm independently … Read more

Understanding Post-Quantum Cryptography

What is Post-Quantum Cryptography Post-quantum cryptography refers to modern public key cryptography that can resist known quantum computing attacks. The security of these cryptographic algorithms relies on computational complexity. Post-quantum encryption is a new encryption method that can leverage existing classical computers to achieve resistance against future quantum attacks. The advantage of post-quantum cryptographic algorithms … Read more

Cryptography: Understanding the Mysteries of Codes

Of course, this behavior is very unethical, hiding behind a screen and trampling on education and law at will. However, the relevant departments have also taken timely measures to prevent such incidents from occurring frequently. Back to the point, if an intruder directly cracks passwords through technical means to disrupt classes, does this “password” have … Read more

Top 5 Data Encryption Methods Loved by Cybersecurity Experts in 2022

With cybercrime being so rampant, what should you do if your data is seen or even stolen by others? Data encryption is a common and effective security method and is the first choice for protecting enterprise data. But how do you encrypt data? Do you know what technologies are involved? Today, we will learn about … Read more

Step-by-Step Analysis of RSA Public Key, Private Key, and Digital Signature Encryption Process

Written by: Jiu Ge In 1977, three mathematicians Rivest, Shamir, and Adleman proposed a new asymmetric encryption algorithm, named after themselves, known as the RSA encryption algorithm. The knowledge of RSA involves advanced mathematics such as number theory and Euler’s function. If you do not have a background in higher mathematics, it is recommended not … Read more

Data Encryption Algorithms in ASP.NET Core

0. Introduction In this article, we will introduce the encryption and decryption in .NET Core. In web applications, user passwords are stored as MD5 hashes. In other cases, encryption and decryption functionalities are also used. Common encryption algorithms are divided into symmetric and asymmetric encryption. Symmetric encryption means that the encryption key and the decryption … Read more

Introduction to Java Encryption Algorithms

There are three types of Java encryption algorithms: 1. One-way encryption algorithm 2. Symmetric encryption algorithm 3. Asymmetric encryption algorithm One-way Encryption Algorithm One-way encryption is an irreversible encryption algorithm, and the encrypted ciphertext cannot be decrypted. Common algorithms include MD5, SHA, and HMAC. MD5 (Message-Digest Algorithm) No matter how long the data is, it … Read more