Explore >> Select a destination


You are here

www.schneier.com
| | dusted.codes
4.0 parsecs away

Travel
| | SHA-256 is not a secure password hashing algorithm
| | www.arcserve.com
3.6 parsecs away

Travel
| | Encryption is an aspect of security technology that you should understand. Learn how encryption works and review a list of common encryption algorithms.
| | www.cryptofails.com
3.8 parsecs away

Travel
| | Reasoning by Lego: The wrong way to think about cryptography. Scott Arciszewski from Paragon Initiative pointed me to this example of PHP cryptography. The code is bad and the crypto design is flawed,...
| | dusty.phillips.codes
30.1 parsecs away

Travel
| The venerable RSA public key encryption algorithm is very elegant. It requires a basic understanding of modular arithmetic, which may sound scary if you havent studied it. It reduces to taking the remainder after integer long division. The RSA Wikipedia article describes five simple steps to generate the keys. Encryption and decryption are a matter of basic exponentiation. Theres no advanced math, and its easy to understand their example of working with small numbers.