## DES Algorithm – Part 4 – Decryption

Welcome to this part-4 session on Data Encryption Standard, the DES. In this session, we will decrypt the ciphertext that we built in part-3 and build plaintext using the same 16 sub-keys that we’ve derived in Part-2. We assume that you’ve already viewed our earlier 3 parts else you’ll feel discontinuity in following this tutorial. […]

## Quantum Teleportation Is Real, Here’s How It Works

Oh crap, I wore my red shirt. I’ll just have to take the risk. Quantum teleportation, to space has finally been done ‘successfully.Which is super exciting, but it’s quantum — which means we didn’t teleport a thing per se, but some data. Basically, Chinese scientists beamed photons from the ground to a satellite orbiting above […]

## DES Algorithm – Part 5 – 3DES

Welcome to this part-5 session on Data Encryption Standard, the DES. In this session, we will understand what is 3DES and how it improves on the single DES. We provide an Excel template that allows you to experiment and understand. We assume that you’ve already viewed our earlier 4 parts else you’ll feel discontinuity in […]

## Symmetric Cryptography

run terminal Create a new text file using nano text editor in terminal write some message in msg.txt In my case I write “I am a secret message” Press CTRL+O to save text in file CTRL+Z to exit nano text editor run command “cat msg.txt” to view text file run ”gpg -c msg.txt” to encrypt […]

## The History of Ethereum

after Satoshi released Bitcoin to the world in 2008 a community of blockchain developers and researchers started to take shape around it many developers contributed to the open source development of Bitcoin several magazines and online blogs also started to appear writing about interesting projects and new ideas in the space one of the members […]

## Lorenz Cipher Machine – Applied Cryptography

This is the structure of the machine. Each letter of the message would be divided into 5 bits, and those would be XOR’d with the value coming from the corresponding K wheel. These wheels would rotate with each letter, and at each position they either had a 0 or a 1, depending on whether there […]

## The Internet: Encryption & Public Keys

Hi my name is Mia Gil-Epner, I’m majoring in Computer Science at UC Berkeley and I work for the Department of Defense, where I try to keep information safe. The Internet is an open and public system. We all send and receive information over shared wires and connections. But even though it’s an open system, […]

## What is Cryptography?

Jamison Cush: Cryptography is a method for protecting information and communications through codes. The codes ensure that only the intended receivers can read and process the messages. “Crypt” means hidden, and “graphy” means writing. Those that practice it are cryptographers. Modern cryptography has four main standards. One confidentiality, only the intended receiver can understand the […]

## Integral Crypto Drive – Encrypted USB Flash Drive (FIPS 197 – PC Edition)

Integral presents Crypto – Encrypted USB Drives 256-bit AES Hardware Encryption Military Level Security FIPS Validated FIPS-197 PC Using the Crypto FIPS-197 PC: Insert USB Drive Total Lock opens automatically Zero Footprint – no software to load Secure password comparison performed on the drive Drive window opens automatically Mandatory hardware encryption of ALL files One […]