Autokey Cipher is a polyalphabetic substitution cipher. It is closely related to the Vigenere cipher but uses a different method of generating the key. It… Read More
Tag Archives: cryptography
Given two strings str1 and str2 containing alpha-numeric characters and a number N. The task is to form a new encrypted string which contains the… Read More
Distributed Denial of Service (DDoS) is a type of DOS attack where multiple systems, which are trojan infected, target a particular system which causes a… Read More
A hash function is a mathematical function that takes an input string of any length and converts it to a fixed-length output string. The fixed-length… Read More
Digital Signature is a mathematical technique that verifies the authenticity of the message or document and also provides non-repudiation where the sender cannot deny signing… Read More
Bitcoin is different from other types of traditional currency such as dollars or euros which you can also use to buy things and exchange value… Read More
Phishing: Phishing is a type of attack on a computer device. In phishing, the attacker tries to find the sensitive information of users by the… Read More
Diffie-Hellman-Algorithm is primarily a protocol that is used for key exchange. Using this interactive protocol two parties will derive a common secret key by communicating… Read More
Feistel Cipher model is a structure or a design used to develop many block ciphers such as DES. Feistel cipher may have invertible, non-invertible and… Read More
Illegally seeking control of a website by taking over a domain is known as Web Jacking. In web jacking attack method hackers compromises with the… Read More
Spring boot is a Java-based framework to develop microservices in order to build enterprise-level applications. You often come across developing projects where you have to… Read More
In present day scenario security of the system is the sole priority of any organisation. The main aim of any organisation is to protect their… Read More
Steganography can be referred as an art of invisible communication. It hides the very presence of communication without leaving any apparent evidence. In other words,… Read More
In cryptography, the avalanche effect is a term associated with a specific behavior of mathematical functions used for encryption. Avalanche effect is considered as one… Read More
Data encryption standard (DES) is a symmetric key block cipher algorithm. The algorithm is based on Feistel network. The algorithm uses a 56-bit key to… Read More