Close

cryptography

Cryptography is protecting information by transforming it into a form that unauthorized individuals cannot easily read or understand. It is used in various applications, including secure communication, data storage, and digital signatures.

RSA Key Generation, Signatures, and Encryption using OpenSSL

OpenSSL

Demonstration of using OpenSSL to create RSA public/private key pair, sign and encrypt messages using those keys, and then decrypt and verify the received messages. Commands used: OpenSSL. Created by Steven Gordon on 7 March 2012 at Sirindhorn International Institute of Technology, Thammasat University, Thailand. Using the RSA algorithm, RSA […]

Devamını Oku

Demystifying Practical Cryptography: Python and MySQL in Focus

Demystifying Practical Cryptography: Python and MySQL in Focus

Theoretical Foundations of Cryptography: From MD5 to SHA-2 Understanding CryptographyCryptography is the art of secure communication. It involves transforming data to prevent unauthorized access. Over the years, various algorithms have emerged. Let’s delve into a few popular ones. MD5: An OverviewMessage Digest Algorithm 5 (MD5) was once a favorite. It […]

Devamını Oku

Create & sign SSL/TLS certificates with OpenSSL

OpenSSL

In this video, we will learn how to generate an SSL/TLS certificate signing request (CSR) and have it signed by a Certificate Authority (CA). We won’t submit the CSR to a real CA for this tutorial. Instead, we will play both the certificate authority and the certificate applicant. We will […]

Devamını Oku

SHA-1 has broken in practice

We have broken SHA-1 in practice.

We have broken SHA-1 in practice. This industry cryptographic hash function standard is used for digital signatures and file integrity verification and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories, and software updates. It is now practically possible to craft two colliding […]

Devamını Oku

What is SHA? What is SHA used for?

cryptography

SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and is used for hashing data and certificates. A hashing algorithm shortens the input data into a more diminutive form that cannot be understood using bitwise operations, modular additions, and compression functions. You may be wondering, can […]

Devamını Oku

Digital Signature example using OpenSSL

Digital Signature example using OpenSSL

What is a digital signature? This walkthrough demonstrates how to create a private key, public key, digitally sign a document, and verify. A digital signature and signing are critical concepts in cryptography and information security. Digital Signature: Signing (in Cryptography): Advantages of Digital Signatures: In the digital world, digital signatures […]

Devamını Oku

Encryption and decryption with OpenSSL

Encryption and decryption with OpenSSL

This tutorial shows how to use OpenSSL in Linux systems (Kali in the video) for symmetric and asymmetric encryption and decryption. OpenSSL is a free and open-source toolkit that provides a robust, commercial-grade, full-featured toolkit for general-purpose cryptography and secure communication. Internet servers, including most HTTPS websites, widely use it. […]

Devamını Oku