-
HMAC: Keyed-Hashing for Message Authentication
It’s called HMAC: Keyed-Hashing for Message Authentication. And let me tell ya, it’s the perfect solution if you want to add some extra security…
-
HMAC: A Secure Method for Combining a Key and Hash Function
Keys are used to encrypt data so only authorized parties can access it, while hashes are used to ensure that data hasn’t been tampered…
-
ECC Encryption and Decryption using Pycryptodome
Remember when encryption was just for nerds? When it took hours to encrypt a single file and you had to be a math genius…
-
Efficient Asymmetric ECC Encryption & Decryption Hybrid Scheme using BrainpoolP256r1 Curve and AES-256-GCM Authenticated Symmetric Cipher in Python with Tinyec and Pycryptodome Libraries
First, let’s understand what hybrid encryption is and why it’s useful. Hybrid encryption combines symmetric key cryptography (which is faster for bulk data) with…
-
ECC-Based Secret Key Derivation with TinyEC Library
Now, if you’re not familiar with this concept, let me break it down for ya: Elliptic Curve Cryptography (ECC) is a fancy way of…
-
Montgomery’s Binary Algorithm for Scalar Multiplication in E(Fp)
It’s called Montgomery’s Binary Algorithm for Scalar Multiplication in E(Fp), and it’s pretty cool. So, let’s say you have an elliptic curve over a…
-
Understanding X25519 ECDH Key Encodings
Relax, it’s all good, because I’m here to break it down for ya in the most casual way possible. First: what is ECDH? Well,…
-
Curve25519 and Curve448: A Comparison of Elliptic Curves for Modern Cryptography
These babies have been around for a while now, but they’re still causing quite a stir among crypto enthusiasts. So what makes these curves…
-
Elliptic Curves in ECC
An elliptical curve is essentially a fancy way of drawing a line that looks like an ellipse (hence the name). It’s not just any…