This section is dedicated to mathmetical problems or notions that are used in cryptography.
Different applications of cryptography
In this section all the asymmetric algorithms are disected (well, the ones I’ve understood well enough to post here).
This is an integrity’s domain!
Here is the kingdom of symmetric algorithms along with the attacks on them and possible usages.
In this article I will try to unravel the HMAC algo, how it’s used, and how it can be attacked.
This article describes how PKCS#5 padding works and how it can be exploited. This method is often used with block cyphers such as AES or DES.
References Expand… 1 Shor’s Algorithm - https://qiskit.org/textbook/ch-algorithms/shor.html
References Expand… Something here