Explore >> Select a destination


You are here

shrik3.com
| | dusty.phillips.codes
4.5 parsecs away

Travel
| | The venerable RSA public key encryption algorithm is very elegant. It requires a basic understanding of modular arithmetic, which may sound scary if you havent studied it. It reduces to taking the remainder after integer long division. The RSA Wikipedia article describes five simple steps to generate the keys. Encryption and decryption are a matter of basic exponentiation. Theres no advanced math, and its easy to understand their example of working with small numbers.
| | vaguery.com
5.0 parsecs away

Travel
| |
| | rog3rsm1th.github.io
3.4 parsecs away

Travel
| | The Okamoto-Uchiyama cryptosystem is a semantically secure, asymmetric encryption algorithm. It was first introduced in 1998 by Tatsuaki Okamoto and Shigenori Uchiyama. The method is additive-homomorphic, which means that the plaintexts are added by multiplying two ciphertexts. It is therefore not necessary to decrypt the ciphertexts in order to be able to operate on the plaintexts. While searching for implementations of this algorithm on github, I realized that there were only two rough implementations.
| | www.thexero.co.uk
25.0 parsecs away

Travel
| Explore the evolution of Wi-Fi security from the flawed WEP protocol to robust WPA3. Learn the strengths and weaknesses of each security standard and best practices for modern networks.