Cryptopals: Set 1 – challenge 3
·
Next up in our Cryptopals walkthrough is some frequency analysis against simple cryptographic keys. Let’s have some fun!
·
Next up in our Cryptopals walkthrough is some frequency analysis against simple cryptographic keys. Let’s have some fun!
·
Building on our cryptopals encoding work last time, let’s introduce byte-based XOR operations.
·
Challenge 1 in the cryptopals suite is to juggle between Base64 and Hex encoding of byte strings. Let’s do just that, with value objects!
·
Starting today I kick off a series on the cryptopals crypto challenges, with my implementations in PHP. Feel free to join in the fun!
·
Different people see career progression from their own angles. I’ve encountered one that makes sense, tho I don’t so much see it as a progression.
·
Refactoring legacy code is like cleaning the dishes. Someone has to do it – hopefully before the stack of moldering waste falls on the floor.
·
I care very deeply about privacy, which translates to a passion for encryption and cryptography. You should care about privacy, too.
·
Cost analysis can be a tricky exercise in the technology space as not all costs are readily apparent during price shopping.
·
Sometimes the best way to make a sale is to stop selling and focus instead on building a relationship and establishing trust.
·
Side channel attacks are one of the many cryptographic footguns we need to avoid while designing and building secure applications.