DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Process Passwords as a Software Developer

How to Process Passwords as a Software Developer

686
Comments 41
4 min read
Cyptography for Beginners

Cyptography for Beginners

269
Comments 2
5 min read
Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️‍♀️

Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️‍♀️

255
Comments 17
5 min read
A Practical Guide to the Web Cryptography API

A Practical Guide to the Web Cryptography API

154
Comments 6
5 min read
Building A Password Manager With React JS, Crypto JS, and Fauna

Building A Password Manager With React JS, Crypto JS, and Fauna

144
Comments 10
26 min read
An introduction to cryptography in distributed ledger technology

An introduction to cryptography in distributed ledger technology

107
Comments 7
4 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

92
Comments
9 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
Message Encryption in JavaScript and PHP

Message Encryption in JavaScript and PHP

80
Comments 5
3 min read
Cryptographically protecting your SPA

Cryptographically protecting your SPA

68
Comments 142
12 min read
Why is Exclusive Or (XOR) Important in Cryptography?

Why is Exclusive Or (XOR) Important in Cryptography?

63
Comments 3
2 min read
Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web

Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web

59
Comments
3 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript

4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript

56
Comments 10
18 min read
How To Build JWT’s in Go (Golang)

How To Build JWT’s in Go (Golang)

53
Comments
3 min read
Understanding public/private RSA keys

Understanding public/private RSA keys

53
Comments
4 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

51
Comments 2
5 min read
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

45
Comments 1
5 min read
Is Open-Source Cryptography Really Secure?

Is Open-Source Cryptography Really Secure?

39
Comments
3 min read
Hashing Passwords – Python Cryptography Examples

Hashing Passwords – Python Cryptography Examples

38
Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

37
Comments
4 min read
Verifying Integrity of Files using NodeJS

Verifying Integrity of Files using NodeJS

33
Comments
3 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

33
Comments 3
6 min read
A beginners guide to infosec

A beginners guide to infosec

30
Comments
6 min read
Making Sense of Public Key Cryptography

Making Sense of Public Key Cryptography

30
Comments 4
12 min read
(Very) Basic Intro To White-Box Cryptography

(Very) Basic Intro To White-Box Cryptography

28
Comments
3 min read
A quick tour of the Python Secrets module

A quick tour of the Python Secrets module

26
Comments 1
3 min read
Encoding vs encryption for 📱iOS app devs 00:45

Encoding vs encryption for 📱iOS app devs

22
Comments 1
2 min read
Verifying Git commits using GPG

Verifying Git commits using GPG

21
Comments 5
3 min read
(Very) Basic intro to AES-256 Cipher

(Very) Basic intro to AES-256 Cipher

20
Comments
5 min read
How Computers generate random numbers ?

How Computers generate random numbers ?

19
Comments 2
3 min read
Brute-forcing an encrypted message from Enigma using the web worker API

Brute-forcing an encrypted message from Enigma using the web worker API

19
Comments 2
13 min read
Cryptography with Practical Examples in .Net Core

Cryptography with Practical Examples in .Net Core

19
Comments 2
6 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
How Do Brute-Force Attackers Know They Found The Key?

How Do Brute-Force Attackers Know They Found The Key?

18
Comments 2
4 min read
They Who Control Encryption

They Who Control Encryption

18
Comments 5
2 min read
Signatures as Authentication in Web3

Signatures as Authentication in Web3

16
Comments
3 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

16
Comments
4 min read
Enigma machine, how does the famous encryption device work?

Enigma machine, how does the famous encryption device work?

15
Comments
9 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

15
Comments
12 min read
SafeCloset, a Secret Safe - Why and how I made it in Rust

SafeCloset, a Secret Safe - Why and how I made it in Rust

14
Comments 3
4 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

14
Comments
5 min read
Cryptography Trends And News Going Into 2020

Cryptography Trends And News Going Into 2020

14
Comments
2 min read
AES-256 Cipher – Python Cryptography Examples

AES-256 Cipher – Python Cryptography Examples

13
Comments 1
4 min read
“Big-O Algorithms” Course Released

“Big-O Algorithms” Course Released

13
Comments
2 min read
What is Cryptography? A Complete Overview

What is Cryptography? A Complete Overview

13
Comments
16 min read
HMAC and MAC Explained Simply – Building Secure Auth With JWTs

HMAC and MAC Explained Simply – Building Secure Auth With JWTs

13
Comments
1 min read
Stop with the Obfuscation: Encoding and Encryption are Not the Same

Stop with the Obfuscation: Encoding and Encryption are Not the Same

13
Comments 1
2 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
Decoding the beauty of cryptography :

Decoding the beauty of cryptography :

12
Comments
4 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

12
Comments
3 min read
.NET: Modelo Criptográfico, lo que necesitas saber.

.NET: Modelo Criptográfico, lo que necesitas saber.

12
Comments
10 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Is random() really random ?

Is random() really random ?

12
Comments 4
4 min read
“Practical Cryptography” Course Released

“Practical Cryptography” Course Released

12
Comments
2 min read
Backstage: cryptographic R&D internship at Cossack Labs

Backstage: cryptographic R&D internship at Cossack Labs

12
Comments
5 min read
ASP.NET Core: Creación de Cookies Seguras con IDataProtector

ASP.NET Core: Creación de Cookies Seguras con IDataProtector

12
Comments
4 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

11
Comments
4 min read
What Is Entropy In Cryptography?

What Is Entropy In Cryptography?

11
Comments 1
3 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

11
Comments
2 min read
loading...