Dynamic Fault Injection Practice on White-box Cryptography Using Unicorn

Dynamic Fault Injection Practice on White-box Cryptography Using Unicorn

Kerckhoffs principle states that the security of a cryptographic system relies solely on the security of the key, with everything else in the system considered public information. However, in reality, software reverse engineering and dynamic/static debugging techniques have successfully executed key extraction attacks on cryptographic systems. Given this fact, both the industry and academia have … Read more

Various Encryption Algorithms Implemented in Python

Various Encryption Algorithms Implemented in Python

Encryption is generally about encrypting binary encoded formats, which corresponds to Python as Bytes. You need to convert str to Bytes using encode and decode. 01 md5 import hashlib def MD5(str): h1 =hashlib.md5() h1.update(str.encode(encoding = 'utf-8')) return h1.hexdigest() # lowercase if __name__ == "__main__": str ='123232' md5 =MD5(str) print("Before encryption: "+ str) print("After encryption: " … Read more

Implementing Symmetric Encryption Algorithms in Go

Implementing Symmetric Encryption Algorithms in Go

Click the blue “Go Language Chinese Network” above to follow us, get a complete set of Go materials, and learn Go language every day Introduction to Encryption Algorithms An encryption algorithm is a method of encryption. In cryptography, encryption is the process of hiding plaintext information so that it is unreadable without special information. Encryption … Read more

Learn the AES Encryption Algorithm with Me

Learn the AES Encryption Algorithm with Me

Experts can skip this; this is just a beginner’s learning note, not very substantial. The renowned AES has always been a concept I knew vaguely, but I didn’t understand its details well and often just skimmed over it. Recently, due to circumstances, I reluctantly started to delve into it… After learning about it, I found … Read more

Explaining the Mathematical Principles of Encryption Algorithms

Explaining the Mathematical Principles of Encryption Algorithms

Recently, Jason invited Mei from the Mathematics Department of Fudan University to give five hardcore math classes for friends interested in Web3. Starting from natural numbers, he explained the details of RSA asymmetric encryption. Let me review and try to explain this rather complex topic. (Math warning ahead, but I promise to limit it to … Read more

Cryptographic Algorithms Unveiled: Balancing Security and Efficiency

Cryptographic Algorithms Unveiled: Balancing Security and Efficiency

1. Overview of Cryptographic Algorithms Cryptographic algorithms play a crucial role in today’s digital age. With the rapid transmission and storage of information, protecting data security and privacy has become a top priority. Cryptographic algorithms are mainly divided into three categories: symmetric encryption, asymmetric encryption, and hashing algorithms. Symmetric encryption algorithms are an early and … Read more

Overview of Cybersecurity and Cryptographic Algorithms

Overview of Cybersecurity and Cryptographic Algorithms

Author: Dou Er Bi’s Daily Link: https://www.jianshu.com/p/05a0f2ec935b Security prevention technologies established and adopted for data processing systems to protect computer hardware, software, and data from accidental and malicious destruction, alteration, and leakage. Main Cybersecurity Threats • Unauthorized access • Information leakage or loss • Data integrity destruction • Denial of Service (DoS) attacks • Spreading … Read more

The Race Between Cryptography and Quantum Computing

The Race Between Cryptography and Quantum Computing

Author: Kelsey Houston-Edwards“Guangming Daily” (November 7, 2024, Page 14)   The advent of future quantum computers will threaten the security of all classical encrypted information, and cryptographers are racing against time to develop encryption algorithms that can confound quantum computers. Rapidly Developing Quantum Computers   Digital security experts worldwide are focusing on the Quantum Year Clock (Y2Q … Read more

Understanding Elliptic Curve Cryptography Assignments

Understanding Elliptic Curve Cryptography Assignments

Created: 2023-12-08 14:17 https://scz.617.cn/misc/202312081417.txt A few days ago, I recommended Andrea Corbellini’s series on elliptic curve cryptography, which consists of four articles that are very exciting and easy to understand. https://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction/ https://andrea.corbellini.name/2015/05/23/elliptic-curve-cryptography-finite-fields-and-discrete-logarithms/ https://andrea.corbellini.name/2015/05/30/elliptic-curve-cryptography-ecdh-and-ecdsa/ https://andrea.corbellini.name/2015/06/08/elliptic-curve-cryptography-breaking-security-and-a-comparison-with-rsa/ Many people have shared and saved these articles, but from my twenty years of experience, the vast majority are just “sharing … Read more

Mastering Encryption Algorithms: Using Crypto++ in C++

Mastering Encryption Algorithms: Using Crypto++ in C++

Crypto++: A Powerful Encryption Library in C++ Crypto++ is an efficient and feature-rich encryption library widely used for implementing data encryption, digital signatures, cryptographic protocols, and more. It offers a plethora of encryption algorithms, including symmetric encryption, asymmetric encryption, hashing algorithms, and digital certificate management. As an open-source project, the flexibility and extensibility of Crypto++ … Read more