If you’re familiar with the laws of thermodynamics , you may recognize the second law as the one that deals with entropy.
Elliptic Curve Cryptography (ECC) is a modern public-key encryption technique famous for being smaller, faster, and more efficient than incumbents.
With quantum computers getting more powerful each year, many worry about the safety of modern encryption standards.
Bcrypt is a key derivation function , which can be thought of as a special kind of hash function .
Lattice-based cryptography, an important contender in the race for quantum-safe encryption, describes constructions of cryptographic primitives that involve mathematical lattices.
Adi Shamir’s Secret Sharing is a cryptographic algorithm that allows distinct parties to jointly share ownership of a single secret by holding shares.
We just launched our new Practical Cryptography course, a code-in-the-browser tutorial where students build cryptographic functions in the Go programming language.
If you’ve seen The Imitation Game or studied computer science in school, you have likely heard of Enigma , Alan Turing , or some of the other advances in cryptography that took place during the Second World War.
HMACs and MACs are authentication codes and are often the backbone of JWT authentication systems. A Message Authentication Code (MAC) is a string of bits that depends on a secret key and is sent with a message to prove the message wasn’t tampered with.
PGP , or its open-source alternative, GPG , is a program used to encrypt data such that only an authorized party can decrypt it.