Cryptography Tutorial

Last updated : May 25, 2023

Cryptography is a method of protecting information and communications through the coding so that only those for whom the information is intended can read and process it.

In computer science, cryptography is used for securing the information and communication techniques derived from mathematical concepts and algorithms, to transform messages in ways that are hard to decipher. These algorithms are used for various cryptography techniques such as cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet, and confidential communications such as credit card transactions and email.

This Cryptography Tutorial contains all topics from basic to advanced like Encryption, Algorithm, Cryptanalysis, Digital signature, Internet of things, Hash function, Block cipher, Attribute-based encryption, Triple DES, Cipher, Confidentiality, Message authentication code, Digital Signature Algorithm, Ciphertext, Network security, Stream cipher, Zero-knowledge proof, Fourier transform, Transposition cipher, and many more.

Cryptography Topics Index

  1. Introduction to Cryptography
  2. Types of Cryptography: Symmetric and Asymmetric
  3. Cryptography: Caesar Cipher and Its Python Implementations
  4. Substitution Techniques and Its Types | Cryptography
  5. Cryptographic Techniques: Vigenére Cipher, Playfair Cipher, Hill Cipher
  6. Cryptography Transposition Techniques
  7. Playfair Cipher in Cryptography
  8. Feistel Cipher in Cryptography
  9. Hill Cipher in Cryptography
  10. Diffie Hellman Algorithm in Cryptography
  11. Rail Fence Cipher in Cryptography
  12. Elliptic Curve Cryptography
  13. Message-Digest Algorithm 5 (MD5) in Cryptography
  14. Cryptography Security: Goals, Attacks, and Principles
  15. Difference Between Stream Ciphers and Block Ciphers
  16. Caesar Cipher in Cryptography
  17. Vigenère Cipher in Cryptography
  18. Vernam Cipher in Cryptography
  19. One-Time Pad Cipher in Cryptography
  20. Hash Function in Cryptography
  21. Applications and Properties of Hash Function in Cryptography
  22. Digital Signatures in Cryptography
  23. Mode of Operation in Cryptography
  24. Electronic Code Book (ECB) in Cryptography
  25. Cipher Block Chaining (CBC) in Cryptography
  26. Ciphertext Feedback (CFB) in Cryptography
  27. Output Feedback Mode (OFB) in Cryptography
  28. Counter (CTR) Mode in Cryptography
  29. Rivest-Shamir-Adleman (RSA) in Cryptography
  30. Advanced Encryption Standard (AES) in Cryptography
  31. Data Encryption Standard (DES) in Cryptography
  32. Digital Signature Algorithm (DSA) in Cryptography
  33. International Data Encryption Algorithm (IDEA) in Cryptography
  34. Multiple DES in Cryptography
  35. Birthday Attack in Cryptography
  36. Boomerang Attack in Cryptography
  37. Quantum Cryptography
  38. MAC-based on Hash Function (HMAC) in Cryptography
  39. MCQ

    More Cryptography MCQs ...

Comments and Discussions!

Load comments ↻

Copyright © 2024 All rights reserved.