Cryptography of the Middle Ages: from alchemical ciphers to magic squares
Among the bright symbols of the Middle Ages are sorcerers, witches, and alchemists who "enchant and turn mercury into gold." Cryptography at this time also went hand…
Among the bright symbols of the Middle Ages are sorcerers, witches, and alchemists who "enchant and turn mercury into gold." Cryptography at this time also went hand…
This article opens a series of materials dedicated to the problems of the modern internet, its centralization, and possible solutions. The introductory article reveals…
Hello! Today we continue to implement encryption. In this article, we will look at the Magma cipher algorithm, which was developed and used in the USSR.
How does a VPN work? How does a service bundle work for reliable and secure data transmission between branches and remote employees? What is quantum communication?
I will briefly introduce the age encryption tool. We will learn to encrypt both personal and corporate backups with one simple command, and then argue about why openssl…
For example, an open-source project contributor wants to share plans while remaining anonymous.
Machine learning is now used to a greater or lesser extent in various industries. Cryptographic analysis is no exception. In this article, we will look at the CipherGAN…