Modern Cryptography

A deep dive into cryptographic algorithms, security protocols, and their practical implementations in modern systems.

Core Cryptographic Primitives

Symmetric

AES Encryption

Advanced Encryption Standard with 128/192/256-bit keys. Used for bulk data encryption through modes like CBC and GCM.

Learn More →
Asymmetric

RSA & ECDSA

Public-key cryptography for secure key exchange and digital signatures using factoring or discrete logarithm hardness.

Learn More →

Cryptographic Hashing

SHA-256

Secure Hash Algorithm variant with 256-bit outputs. Used in blockchain, TLS, and digital signatures.

HMAC

Hash-based Message Authentication Code for message verification using symmetric keys and cryptographic hash functions.

BLAKE3

Modern cryptographic hash function with parallel processing efficiency. Designed as replacement for SHA-2 and SHA-3.

Key Exchange Protocols

DH
Diffie-Hellman

Secure key exchange protocol allowing parties to establish shared secrets over insecure channels without prior knowledge.

Alice
Bob
QKD
Quantum Key Distribution

Quantum-resistant protocol using photon polarization states for secure key distribution, theoretically immune to eavesdropping.

Quantum Channel
Secure Key

Common Attack Vectors

MITM Side-channel Brute Force Collision Padding
Attack Vector Map

Development Tools

Modern Libraries

1

libsodium (crypto_box)

2

OpenSSL (EVP)

3

RustCrypto (ring)

Security Evolution

1970 1990 2009 2015 2025