Cryptopals: Set 1 – challenge 2
·
Building on our cryptopals encoding work last time, let’s introduce byte-based XOR operations.
·
Building on our cryptopals encoding work last time, let’s introduce byte-based XOR operations.
·
Challenge 1 in the cryptopals suite is to juggle between Base64 and Hex encoding of byte strings. Let’s do just that, with value objects!
·
Side channel attacks are one of the many cryptographic footguns we need to avoid while designing and building secure applications.
·
How do you communicate securely over an insecure medium? Using the Diffie-Hellman key exchange to agree on an encryption key is a start!
·
Expert cryptographers will warn you to never roll your own algorithms. Well, they’re wrong and here are three reasons why.
·
The Vigenere cipher is more complicated that the Caesar cipher but based on the same idea. It uses a running key to keep your message secure.
·
Anyone studying cryptography needs to understand various forms of ciphers. Today, we’ll look at three that you should know well.
·
One of the most basic encryption schemes is the Caesar cipher. It’s weak in practice, but a great way to learn how crypto works.
·
Modulo arithmetic with numbers large enough to ensure cryptographic security is complicated, particularly in PHP. Let’s work around that…
·
Modulo exponentiation lies at the core of most modern crypto. Learn three different ways to perform this calculation in PHP.