A generation ago, an ordinary person’s only brush with cryptography might be watching a spy movie. Now we all rely cryptography every day, whether we realize it or not.
Before you could read this web page, your web browser and my web server exchanged public keys, using asymmetric encryption to exchange keys for symmetric encryption. The modern web, and even the modern economy, would not be possible without encryption.
Here are some of the blog posts on this site related to cryptography.
RSA
- Attack on RSA with exponent 3
- RSA with one shared prime
- RSA with pseudoprimes
- RSA exponents are mostly all the same in practice
Random Number Generation
Secure hash functions
- Microsoft replacing SHA-1
- Reversing an MD5 hash
- Hash function menagerie
- Salting and stretching a password
- Mental cryptography
- Computing hash functions from the command line
Elliptic Curve Cryptography
- What is an elliptic curve?
- Curve1174
- Naming elliptic curves
- secp256k1
- secp256r1
- Curve25519
- Ed448 Goldilocks
- P-384
Post-Quantum Cryptography
- From now until quantum
- Learning with errors
- Code-based encryption
- Unbalanced oil and vinegar
- Isogeny-based methods