Crypto

Cryptography is the science of cryptographic algorithms (known as Cipher) that implements the following functionalities:

Usage

Encryption/Decryption

Cryptographic algorithms transforms:

Hashing (Data Integrity and Signature)

Cryptographic algorithms transforms transforms a plaintext into a unique hash:

• without secret
• with secret (known as signature)

Anonymity Security : Kerckhoffs Principle

1) A cryptosystem should be secure even if everything about the system, except the secret (private key), is public knowledge.

In designing security systems, it is wise to assume that the details of the cryptographic algorithm are already available to the attacker. This is known as:

Because the algorithms are well known. it's the only the parameter of cipher algorithm that protect the anonymity. This parameter is known as the secret (private key).

An attacker who obtains the secret (key) can :

Characters

Alice and Bob are fictional characters commonly used as placeholder names in cryptology

Discover More
Authenticity

is a functionality of cryptography that verifies that the sender of the message is who he claimed to be. This functionality is implemented with the digital signature functionality. And as a side effect,...
Cryptography - Data integrity

Data integrity in cryptography is perform with a hash function. It is based on the fact that the output of a hash function changes when the input has changed. Therefore, by controlling the computed...
Cryptography - Nonce (Number Only used once)

In cryptography, a nonce is an arbitrary number that can only be used once. A value that is used only once. It is similar in spirit to a nonce word, hence the name. It is often a random or pseudo-random...
Cryptography - Secrecy

secrecy is a functionality of cryptographic algorithm that ensures that no-one can read a message in transit. This is done by encrypting a message at minimal with a key.
Cryptography - Storage of key material

This page lists the datastore / file of cryptographic material such as: key LDAP identity certificat signing request and more. Key and key pair file format is the binary...
Function - One way

With a one way function, it should be hard to determine the original input when only the output is known. They are fundamental tools for: cryptography, authentication, and other data security...
Software Security

Security regroups many subject area. The most known are: Identity management with: authentication (user/password) and its method (ldap, table, ...) authorization (group, privileges and role, object...