DEV Community

# cryptography

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
(Very) Basic Shamir’s Secret Sharing

(Very) Basic Shamir’s Secret Sharing

11
Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

8
Comments 3
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
How to store E2EE keys in the browser

How to store E2EE keys in the browser

7
Comments
4 min read
Why and How: Switch from RSA to ECDSA SSH keys

Why and How: Switch from RSA to ECDSA SSH keys

6
Comments 3
7 min read
Qvault’s Lead Engineer Interviewed on “Running in Production”

Qvault’s Lead Engineer Interviewed on “Running in Production”

5
Comments
1 min read
Julius Caesar's Cryptography

Julius Caesar's Cryptography

4
Comments
1 min read
A glimpse into the challenges of working with Cryptography APIs in NodeJS

A glimpse into the challenges of working with Cryptography APIs in NodeJS

10
Comments
5 min read
How to Process Passwords as a Software Developer

How to Process Passwords as a Software Developer

686
Comments 41
4 min read
Securely sending Emails from static sites with a 3rd party API

Securely sending Emails from static sites with a 3rd party API

7
Comments
5 min read
Message Encryption in JavaScript and PHP

Message Encryption in JavaScript and PHP

80
Comments 5
3 min read
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

45
Comments 1
5 min read
Understanding public/private RSA keys

Understanding public/private RSA keys

56
Comments
4 min read
Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web

Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web

62
Comments
3 min read
Brute-forcing an encrypted message from Enigma using the web worker API

Brute-forcing an encrypted message from Enigma using the web worker API

22
Comments 2
13 min read
p.1 My attempt at building a Password Manager

p.1 My attempt at building a Password Manager

12
Comments 2
8 min read
Building an Enigma machine with only TypeScript and then use Angular DI system to properly instantiate it

Building an Enigma machine with only TypeScript and then use Angular DI system to properly instantiate it

11
Comments
17 min read
4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript

4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript

61
Comments 11
18 min read
Cloud Misconfigurations and Cryptojacking?

Cloud Misconfigurations and Cryptojacking?

8
Comments
3 min read
Stop with the Obfuscation: Encoding and Encryption are Not the Same

Stop with the Obfuscation: Encoding and Encryption are Not the Same

13
Comments 1
2 min read
So Many Auths!

So Many Auths!

9
Comments
6 min read
Securing secret key in Android using Keystore

Securing secret key in Android using Keystore

7
Comments
4 min read
Enigma machine, how does the famous encryption device work?

Enigma machine, how does the famous encryption device work?

15
Comments
9 min read
They Who Control Encryption

They Who Control Encryption

18
Comments 5
2 min read
BIP 32 Watch-Only Wallets

BIP 32 Watch-Only Wallets

5
Comments
3 min read
(Very) Basic Intro to the Scrypt Hash

(Very) Basic Intro to the Scrypt Hash

7
Comments
3 min read
Down the Rabbit Hole Debugging Node.js Cipher Support

Down the Rabbit Hole Debugging Node.js Cipher Support

7
Comments 1
7 min read
Future Developments - Decentralized Identity

Future Developments - Decentralized Identity

8
Comments
4 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
Waves Technical Review

Waves Technical Review

12
Comments 1
6 min read
GPG-signing your Git commits

GPG-signing your Git commits

22
Comments 1
7 min read
An overview about hash functions: Theory and Security

An overview about hash functions: Theory and Security

6
Comments
6 min read
Creating a blockchain with less 100 code lines

Creating a blockchain with less 100 code lines

10
Comments
3 min read
Caesar Cipher Implementation in Python

Caesar Cipher Implementation in Python

9
Comments
4 min read
RSA: How Maths will protect us while P!=NP

RSA: How Maths will protect us while P!=NP

42
Comments 1
8 min read
What I learned about cryptography in 3 weeks

What I learned about cryptography in 3 weeks

49
Comments 18
2 min read
Stealth Addressing in depth [1/3]

Stealth Addressing in depth [1/3]

9
Comments 1
4 min read
Store Encrypted Files in Google Drive

Store Encrypted Files in Google Drive

31
Comments 3
12 min read
PHP Security: Passwords

PHP Security: Passwords

32
Comments 21
4 min read
Symmetric Encryption Key Storage

Symmetric Encryption Key Storage

15
Comments 1
1 min read
Digital signatures : a gentle introduction

Digital signatures : a gentle introduction

12
Comments
3 min read
Another Round of JWT.io and JWT Debugger Extension Updates

Another Round of JWT.io and JWT Debugger Extension Updates

11
Comments
1 min read
Adding Salt to Hashing: A Better Way to Store Passwords

Adding Salt to Hashing: A Better Way to Store Passwords

9
Comments
1 min read
Hashing Passwords: One-Way Road to Security

Hashing Passwords: One-Way Road to Security

5
Comments
1 min read
Crypto Is Hard

Crypto Is Hard

10
Comments
1 min read
Blockchain: what is in a block?

Blockchain: what is in a block?

98
Comments 31
5 min read
Java KeyStores—the gory details

Java KeyStores—the gory details

11
Comments 4
7 min read
Fun with secrets

Fun with secrets

28
Comments
3 min read
Supply Chain Attacks and Secure Software Updates

Supply Chain Attacks and Secure Software Updates

15
Comments
6 min read
Learning About Cryptography through Pain

Learning About Cryptography through Pain

2
Comments
7 min read
Achieving Data Integrity Using Cryptography

Achieving Data Integrity Using Cryptography

5
Comments
3 min read
Gradual Security Claims

Gradual Security Claims

7
Comments
3 min read
Secure Machine Learning

Secure Machine Learning

10
Comments
4 min read
Pragmatically Generating a Self-Signed Certificate and Private Key using OpenSSL

Pragmatically Generating a Self-Signed Certificate and Private Key using OpenSSL

1
Comments 2
7 min read
Is Open-Source Cryptography Really Secure?

Is Open-Source Cryptography Really Secure?

39
Comments
3 min read
PHP 7.2: The First Programming Language to Add Modern Cryptography to its Standard Library

PHP 7.2: The First Programming Language to Add Modern Cryptography to its Standard Library

13
Comments 16
1 min read
Auto-mounting encrypted drives with a remote key on Linux

Auto-mounting encrypted drives with a remote key on Linux

6
Comments
8 min read
Using cryptography to protect PII in GDPR protected jurisdictions

Using cryptography to protect PII in GDPR protected jurisdictions

10
Comments 1
13 min read
How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

6
Comments
4 min read
loading...