Posts

Post has attachment

AES-256 is considered among the top ciphers for symmetric key encryption - try it out with our AES Encryption tool.

https://learncryptography.com/tools/aes-encryption

https://learncryptography.com/tools/aes-encryption

Add a comment...

Post has attachment

Having strong, unique, and secured passwords is a necessity - using a password manager can make it easy.

https://learncryptography.com/computer-security/password-management

https://learncryptography.com/computer-security/password-management

Add a comment...

Post has attachment

Security isn't something you buy - it's knowledge you arm yourself with. Check out our computer security checklist:

https://learncryptography.com/computer-security/computer-security-checklist

https://learncryptography.com/computer-security/computer-security-checklist

Add a comment...

Post has attachment

Big O Notation is a way of expressing how well an algorithm performs as the input data grows - it's time complexity.

http://learncryptography.com/big-o-notation/

http://learncryptography.com/big-o-notation/

Add a comment...

Post has attachment

The Birthday Problem in mathematics concerns the probabilities of collision between two items in a set of multiple.

http://learncryptography.com/the-birthday-problem/

http://learncryptography.com/the-birthday-problem/

Add a comment...

Post has attachment

A Hash Collision Attack is performed by finding two inputs to a hash function that produce the same hash result.

http://learncryptography.com/hash-collision-attack/

http://learncryptography.com/hash-collision-attack/

Add a comment...

Post has attachment

We often consider 256-bit encryption 'secure', but why is 2^256 the magic number for secure encryption?

Add a comment...

Post has attachment

The Caesar Cipher is one of the oldest encryption techniques - a simple alphabet shift for each letter across an entire message. http://learncryptography.com/caesar-cipher/

Add a comment...

Post has attachment

Rainbow Tables were used to speed up password cracking, until salting and more secure hashing algorithms came around.

http://learncryptography.com/rainbow-tables/

http://learncryptography.com/rainbow-tables/

Add a comment...

Post has attachment

Online services should store password hashes instead of actual passwords, as storing plaintext passwords is needlessly risky.

http://learncryptography.com/password-storage-hash-functions/

http://learncryptography.com/password-storage-hash-functions/

Add a comment...

Wait while more posts are being loaded