Cryptography

Latest Dec 9, 2025
Every time you connect to a Wi-Fi network, send a message through an encrypted app, or access your bank account online,...

Guide to Advanced Encryption Standard (AES)

Every time you connect to a Wi-Fi network, send a message through an encrypted app, or access your bank account online, you're relying on encryption to keep your data safe. At the heart of this digital security infrastructure stands the Advanced Encryption Standard (AES) — the encryption algorithm...

Guide to Advanced Encryption Standard (AES)
Jul 14, 2025 16 min read
Introduction Data breaches have become routine: millions of users worldwide face the consequences of compromised...

Private password breach checking: A new algorithm for secure password validation

Introduction Data breaches have become routine: millions of users worldwide face the consequences of compromised passwords. The scale is staggering: billions of credentials are exposed, fueling automated attacks and credential stuffing on a massive scale. Services like "Have I Been Pwned" now...

Private password breach checking: A new algorithm for secure password validation
Jul 19, 2023 5 min read
Symmetric algorithms, forming the backbone of modern cryptography, offer a secure method of encrypting and decrypting...

Pros and cons of symmetric algorithms: Ensuring security and efficiency

Symmetric algorithms, forming the backbone of modern cryptography, offer a secure method of encrypting and decrypting data utilizing a single shared key. They have been widely adopted for their unmatched speed and efficiency. Like any other technology, symmetric algorithms come with their own set...

Pros and cons of symmetric algorithms: Ensuring security and efficiency
Mar 25, 2022 6 min read
If you've heard of ‘SHA’ in various forms but aren't sure what it stands for or why it's essential — you’re in luck!...

How SHA-256 works

If you've heard of ‘SHA’ in various forms but aren't sure what it stands for or why it's essential — you’re in luck! We'll attempt to shed some light on the family of cryptographic hash algorithms today. But, before we get into SHA, let's go over what a hash function is and how it works. Before...

How SHA-256 works
Feb 10, 2022 5 min read
If the concept of ‘quantum cryptography' sounds complicated to you, you're right. That’s why this ‘encryption tutorial...

What is quantum cryptography?

If the concept of ‘quantum cryptography' sounds complicated to you, you're right. That’s why this ‘encryption tutorial for dummies’ shall demystify the concept and provide an explanation in layman’s terms. Quantum cryptography, which has been around for a few decades, is becoming more and more...

What is quantum cryptography?
Jan 12, 2022 6 min read
End-to-end encryption has been introduced by many communication providers in recent years, notably WhatsApp and Zoom....

What is End-to-end encryption?

End-to-end encryption has been introduced by many communication providers in recent years, notably WhatsApp and Zoom. Although those companies have tried to explain the concept to their user base several times, we believe they failed. Whilst it's clear that these platforms have increased security,...

What is End-to-end encryption?
Jan 10, 2022 6 min read
In this year of our lord, 2022, the term ‘Zero-Knowledge Encryption’ equates to best-in-class data insurance. We’ve...

Why Zero-Knowledge Encryption is the best

In this year of our lord, 2022, the term ‘Zero-Knowledge Encryption’ equates to best-in-class data insurance. We’ve already written an article named “What is Zero-Knowledge Proof?”, so we’re not going to look at definitions here, but rather, we’re going to explore the pros and cons of...

Why Zero-Knowledge Encryption is the best
Dec 20, 2021 6 min read
It is rare for technologies to be born from ambitious philosophical concepts or mind games. But, when it comes to...

What is Zero-knowledge proof?

It is rare for technologies to be born from ambitious philosophical concepts or mind games. But, when it comes to security and cryptography – everything is a riddle. One of such riddles is ‘How can you prove that you know a secret without giving it away?’. Or in other words, ‘how can you tell...

What is Zero-knowledge proof?