Introduction to WLAN Topology and Composition Principles

Introduction to WLAN Topology and Composition Principles

Click the blue text above to follow us Resource Release Huawei Certified Beginner to Advanced Practical Course ↓ Scan to watch practical videos ↓ 1. WLAN Composition Structure The WLAN composition structure includes stations (STA), wireless medium (WM), access points (AP), and distributed systems (DS). 1. Station (STA) Generally refers to terminal devices in the … Read more

Symmetric Encryption Algorithms Overview

Symmetric Encryption Algorithms Overview

This series is divided into two parts, primarily introducing knowledge related to symmetric encryption, including the concept of symmetric encryption, its development history, block cipher algorithm structure, stream cipher algorithm structure, typical symmetric encryption algorithms, and the applications of symmetric encryption algorithms. 1.Concept of Symmetric Encryption Algorithms Both parties in communication can use a secure … Read more

Course Notes: Theory and Construction of Fully Homomorphic Encryption – Part One

Course Notes: Theory and Construction of Fully Homomorphic Encryption - Part One

Introduction: This article is the course notes from the afternoon session of the Fully Homomorphic Encryption summer class. The afternoon course was taught by Professor Xie Xiang, titled “Theory and Construction of Fully Homomorphic Encryption.” Professor Xie is a researcher at Shanghai Qi-Zhi Institute, primarily engaged in the research and implementation of efficient and secure … Read more

What Is Encryption? From Caesar to Enigma Machine

What Is Encryption? From Caesar to Enigma Machine

This article is an excerpt from a book produced by Zhihu: “Cats, Einstein, and Cryptography: Quantum Communication That I Can Understand” From Julius Caesar to Sherlock Holmes from Nazi leader Hitler to the father of AI, Turing… How did the ultimate code in the field of communication come into being? All of this must start … Read more

Why Did Google Crack the SHA-1 Algorithm?

Why Did Google Crack the SHA-1 Algorithm?

A few days ago, the news of Google cracking the SHA-1 algorithm flooded my social media feed. In fact, the term “crack” is not entirely accurate, it should be that they published an example of breaking the SHA-1 algorithm. Regarding this news, I saw two different comments: A: Wow, that’s amazing! They actually cracked an … Read more

Understanding Block Ciphers: A Comprehensive Overview

Understanding Block Ciphers: A Comprehensive Overview

Reliable and Efficient: The Block Cipher Written by | Teacher Kang In the previous five issues, we discussed the intrinsic characteristics and structures of cryptography, as well as the relationship between cryptography and security. Starting from this issue, we enter the second part of this series – the

Introduction to Commercial Cryptographic Algorithms

Introduction to Commercial Cryptographic Algorithms

Commercial cryptographic technology refers to the technology that can implement encryption, decryption, and authentication functions of commercial cryptographic algorithms (including programming technology for cryptographic algorithms and implementation technologies for cryptographic algorithm chips, encryption cards, etc.). Commercial cryptographic technology is the core of commercial cryptography, and the state has classified commercial cryptographic technology as a national … Read more

Organizing Notes | Team Learning Cryptography Session 6: Basics of Cryptographic Mathematics – Finite Fields

Organizing Notes | Team Learning Cryptography Session 6: Basics of Cryptographic Mathematics - Finite Fields

1. Operations In simple terms, a group ring field is a collection with operations. Let’s first look at some content related to operations. An operation is actually a mapping from one set to another: We call an operation involving n operands an n-ary (target) operation; specifically, if n=2, it is called a binary operation. At … Read more

Research and Implementation of RSA Encryption Algorithm Improvement

Research and Implementation of RSA Encryption Algorithm Improvement

Research and Realization of the RSA Encryption Algorithm Improvement YU Xin–hong,CHEN Qi,YAN Yu (Economy and Technology Institute, Anhui Agricultural University, Hefei, Anhui 230011, China) Abstract:The modular exponentiation and modular multiplication are essential elements to secure RSA algorithm. However, modular exponentiation has been so time-intensive that it impedes RSA algorithm’s application. Therefore, it is paramount to … Read more

Understanding RSA Algorithm Principles (Part 1)

Understanding RSA Algorithm Principles (Part 1)

If you ask me, which algorithm is the most important? I might answer “Public Key Encryption Algorithm“. Because it is the cornerstone of computer communication security, ensuring that encrypted data cannot be cracked. You can imagine the consequences if credit card transactions are compromised. Before getting into the main topic, let me briefly introduce what … Read more