Cryptopals: Set 1 – challenge 2
·
Building on our cryptopals encoding work last time, let’s introduce byte-based XOR operations.
·
Building on our cryptopals encoding work last time, let’s introduce byte-based XOR operations.
·
Challenge 1 in the cryptopals suite is to juggle between Base64 and Hex encoding of byte strings. Let’s do just that, with value objects!
·
Starting today I kick off a series on the cryptopals crypto challenges, with my implementations in PHP. Feel free to join in the fun!
·
I care very deeply about privacy, which translates to a passion for encryption and cryptography. You should care about privacy, too.
·
Side channel attacks are one of the many cryptographic footguns we need to avoid while designing and building secure applications.
·
The weakest form of security is that obtained through obscurity – hiding what would otherwise be plainly found in hopes it’ll be missed.
·
How do you communicate securely over an insecure medium? Using the Diffie-Hellman key exchange to agree on an encryption key is a start!
·
Expert cryptographers will warn you to never roll your own algorithms. Well, they’re wrong and here are three reasons why.
·
The Vigenere cipher is more complicated that the Caesar cipher but based on the same idea. It uses a running key to keep your message secure.
·
Anyone studying cryptography needs to understand various forms of ciphers. Today, we’ll look at three that you should know well.