Profile cover photo
Profile photo
Learn Cryptography
89 followers -
An all-in-one resource for aspiring cryptographers.
An all-in-one resource for aspiring cryptographers.

89 followers
About
Posts

Post has attachment
AES-256 is considered among the top ciphers for symmetric key encryption - try it out with our AES Encryption tool.
https://learncryptography.com/tools/aes-encryption
Add a comment...

Post has attachment
Having strong, unique, and secured passwords is a necessity - using a password manager can make it easy.
https://learncryptography.com/computer-security/password-management
Add a comment...

Post has attachment
Security isn't something you buy - it's knowledge you arm yourself with. Check out our computer security checklist:
https://learncryptography.com/computer-security/computer-security-checklist
Add a comment...

Post has attachment
Big O Notation is a way of expressing how well an algorithm performs as the input data grows - it's time complexity.
http://learncryptography.com/big-o-notation/
Add a comment...

Post has attachment

Post has attachment
A Hash Collision Attack is performed by finding two inputs to a hash function that produce the same hash result. 
http://learncryptography.com/hash-collision-attack/
Add a comment...

Post has attachment

Post has attachment

Post has attachment
Rainbow Tables were used to speed up password cracking, until salting and more secure hashing algorithms came around.
http://learncryptography.com/rainbow-tables/
Add a comment...

Post has attachment
Online services should store password hashes instead of actual passwords, as storing plaintext passwords is needlessly risky.
http://learncryptography.com/password-storage-hash-functions/
Add a comment...
Wait while more posts are being loaded