top of page

The BlockBreakers Blog
The Basics of Crypto 10: Key Exchange Systems
Cryptography is great once you and the person you intend to exchange messages with have agreed upon a shared secret which you can use to...
Jun 20, 20222 min read
0 views
0 comments
The Basics of Crypto 9: Public Key Encryption
Public key encryption algorithms (such as RSA) have two keys, a public and a private key. Public keys are used for encryption and private...
Jun 20, 20223 min read
0 views
0 comments
The Basics of Crypto 8: Authenticated Encryption Algorithms
Authenticated encryption algorithms combine the functionality of a standard encryption algorithm alongside the signature functionality...
Jun 20, 20223 min read
0 views
0 comments
The Basics of Crypto 7: Keyed Hashing Functions
Keyed hashing functions are essentially normally hashing functions with a system of validation. They are used commonly in modern...
Jun 20, 20223 min read
1 view
0 comments
The Basics of Crpyto 6: Hashing Functions
Hashing functions are everywhere, if you have ever seen the MD5 checksum for a download or SHA-1/256 written next to a random string...
Jun 20, 20223 min read
0 views
0 comments
The Basics of Crypto 5: Stream Ciphers
Stream ciphers are symmetric key ciphers similar to block ciphers but operate in a very different way. A stream cipher takes the key and...
Jun 20, 20225 min read
2 views
0 comments
The Basics of Crypto 4: Block Ciphers
Block cipher encryption systems are some of the most commonly found encryption systems in use today. Both AES and DES are block cipher...
Jun 20, 20224 min read
0 views
0 comments
The Basics of Crypto 3: What is Security in Cryptography
The short answer to this is something is considered secure in cryptography when breaking it is impractical in a reasonable time frame. So...
Jun 20, 20223 min read
1 view
0 comments
bottom of page