The Merkle-Damgard structure, known as the MD structure for short, is used to defend against collision attacks in hash algorithms. This structure is the basis...
Feistel cipher, also known as Luby -- Rackoff block cipher, is used to construct the symmetric structure of block encryption algorithms. It was invented by...
In the previous article, we talked about the Blowfish algorithm. Since the blocks are small and only 64bits per encryption, it is not recommended to...
Blowfish is a symmetric key grouping encryption algorithm invented by Bruce Schneier in 1993, similar DES and AES are grouping encryption algorithm, Blowfish is used...
Hash is a feature commonly used in cryptography and modern programs. If the hash algorithm is poorly designed, it will produce hash collisions or even...
The birthday attack is actually a probability theory problem, which means that something that seems very difficult to happen is actually very likely to happen....
The distribution of secret keys can be accomplished through asymmetric encryption. Alice and Bob communicate, and Alice sends data to Bob, using the process of...
A memory-bound function can be called a memory-bound function, which means that the time to complete a given computation problem depends primarily on the amount...