|
You are here |
www.schneier.com | ||
| | | | |
dusted.codes
|
|
| | | | | SHA-256 is not a secure password hashing algorithm | |
| | | | |
www.arcserve.com
|
|
| | | | | Encryption is an aspect of security technology that you should understand. Learn how encryption works and review a list of common encryption algorithms. | |
| | | | |
www.cryptofails.com
|
|
| | | | | Reasoning by Lego: The wrong way to think about cryptography. Scott Arciszewski from Paragon Initiative pointed me to this example of PHP cryptography. The code is bad and the crypto design is flawed,... | |
| | | | |
dusty.phillips.codes
|
|
| | | The venerable RSA public key encryption algorithm is very elegant. It requires a basic understanding of modular arithmetic, which may sound scary if you havent studied it. It reduces to taking the remainder after integer long division. The RSA Wikipedia article describes five simple steps to generate the keys. Encryption and decryption are a matter of basic exponentiation. Theres no advanced math, and its easy to understand their example of working with small numbers. | ||