Back2Pavillion | Tag Archives: Cryptography

Tag Archives: Cryptography

Cryptography: Block Cipher & Feistel Block Cipher

Block cipher Crypto

We have learned traditional cipher techniques and various core cryptographic techniques so far. Let’s move forward and discuss on Block cipher and Feistel block cipher. Let’s have quick revisions from previous sessions. Revision from previous sessions Major traditional cipher techniques Caesar traditional cipher – type A Caesar traditional cipher – …

Read More »

Understanding some Traditional Cipher techniques

Traditional Cipher techniques

In previous sessions we have learned modern cryptographic techniques which include Symmetric key encryption and asymmetric key encryption. Today we are going to learn about some traditional cipher technique which people used earlier to protect important information. Revision from previous class Kerckhoff’s principle of cryptography Cryptographic attacks Active Attacks Passive …

Read More »

Understanding major Cryptographic attacks

Welcome to third session on Cryptography. Let us have quick revision of previous class! Revision from previous class: Cryptosystems Types of Cryptosystems Symmetric key encryption Asymmetric key encryption Session 1 Link – Cryptography: Basic Understanding Session 2 Link- Cryptosystem and its types This is the age of information. Internet is …

Read More »

Cryptosystem and its types

cryptography

This is second session in the series of posts on Cryptography. I would recommend you to read the previous article on the same before you go through this article. It will help you build your better understandings on Cryptography & Cryptosystem. Revision from previous session: We have learnt below topics …

Read More »

Cryptography: Basic understanding

cryptography

Globalization made the world closer so the Internet made them connected. Internet is so vast that we can’t risk our data security over the internet. Science of Cryptography mainly deals on how we can secure data over Internet through encryption and decryption. We are going to cover full research based …

Read More »