Modern Cryptography
A deep dive into cryptographic algorithms, security protocols, and their practical implementations in modern systems.
Cryptography ensures Confidentiality, Integrity, Authentication, and Non-repudiation (CIAN). This page explores cryptographic primitives, key exchange protocols, and modern attack vectors.
Core Cryptographic Primitives
AES Encryption
Advanced Encryption Standard with 128/192/256-bit keys. Used for bulk data encryption through modes like CBC and GCM.
RSA & ECDSA
Public-key cryptography for secure key exchange and digital signatures using factoring or discrete logarithm hardness.
Cryptographic Hashing
SHA-256
Secure Hash Algorithm variant with 256-bit outputs. Used in blockchain, TLS, and digital signatures.
HMAC
Hash-based Message Authentication Code for message verification using symmetric keys and cryptographic hash functions.
BLAKE3
Modern cryptographic hash function with parallel processing efficiency. Designed as replacement for SHA-2 and SHA-3.
Key Exchange Protocols
Secure key exchange protocol allowing parties to establish shared secrets over insecure channels without prior knowledge.
Quantum-resistant protocol using photon polarization states for secure key distribution, theoretically immune to eavesdropping.
Common Attack Vectors
Development Tools
Modern Libraries
libsodium (crypto_box)
OpenSSL (EVP)
RustCrypto (ring)