## What Is Entropy In Cryptography?

### Sep 28, 2020 by Lane Wagner

If you’re familiar with the laws of thermodynamics , you may recognize the second law as the one that deals with entropy.

## Elliptic Curve Cryptography: A Basic Introduction

### Sep 17, 2020 by Lane Wagner

Elliptic Curve Cryptography (ECC) is a modern public-key encryption technique famous for being smaller, faster, and more efficient than incumbents.

## Is AES-256 Quantum Resistant?

### Sep 10, 2020 by Lane Wagner

With quantum computers getting more powerful each year, many worry about the safety of modern encryption standards.

## Bcrypt Step by Step

### Aug 24, 2020 by Lane Wagner

Bcrypt is a key derivation function , which can be thought of as a special kind of hash function .

## (Very) Basic Intro to Lattices in Cryptography

### Aug 21, 2020 by Lane Wagner

Lattice-based cryptography, an important contender in the race for quantum-safe encryption, describes constructions of cryptographic primitives that involve mathematical lattices.

## Shamir’s Secret Sharing Step-By-Step

### Aug 18, 2020 by Lane Wagner

Adi Shamir’s Secret Sharing is a cryptographic algorithm that allows distinct parties to jointly share ownership of a single secret by holding shares.

## “Practical Cryptography” Course Released

### Aug 14, 2020 by Lane Wagner

We just launched our new Practical Cryptography course, a code-in-the-browser tutorial where students build cryptographic functions in the Go programming language.

## They Who Control Encryption

### Aug 12, 2020 by Lane Wagner

If you’ve seen The Imitation Game or studied computer science in school, you have likely heard of Enigma , Alan Turing , or some of the other advances in cryptography that took place during the Second World War.

## HMAC and MACs - The Inner Workings of JWTs

### Aug 05, 2020 by Lane Wagner

HMACs and MACs are authentication codes and are often the backbone of JWT authentication systems. A Message Authentication Code (MAC) is a string of bits that depends on a secret key and is sent with a message to prove the message wasn’t tampered with.

## (Very) Basic Intro to PGP (GPG)

### Jul 27, 2020 by Lane Wagner

PGP , or its open-source alternative, GPG , is a program used to encrypt data such that only an authorized party can decrypt it.

- Next