Author: misamaliraza94

  • Cryptosystems

    A cryptosystem is an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. A cryptosystem is also referred to as a cipher system. Let us discuss a simple model of a cryptosystem that provides confidentiality to the information being transmitted. This basic model is depicted in the illustration below − The illustration…

  • Cryptography Primitives

    Cryptography primitives are nothing but the tools and techniques in Cryptography that can be selectively used to provide a set of desired security services − The following table shows the primitives that can achieve a particular security service on their own. Note − Cryptographic primitives are intricately related and they are often combined to achieve a…

  • Security Services of Cryptography

    The primary objective of using cryptography is to provide the following four fundamental information security services. Let us now see the possible goals intended to be fulfilled by cryptography. Confidentiality Confidentiality is the fundamental security service provided by cryptography. It is a security service that keeps the information from an unauthorized person. It is sometimes…

  • Context of Cryptography

    Cryptology, the study of cryptosystems, can be subdivided into two branches − What is Cryptography? Cryptography is the art and science of making a cryptosystem that is capable of providing information security. Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental…

  • Modern Cryptography

    Modern cryptography is the cornerstone of computer and communications security. Its foundation is based on various concepts of mathematics such as number theory, computational-complexity theory, and probability theory. Characteristics of Modern Cryptography There are three major characteristics that separate modern cryptography from the classical approach. Classic Cryptography Modern Cryptography It manipulates traditional characters, i.e., letters…

  • Evolution of Cryptography

    It is during and after the European Renaissance, various Italian and Papal states led the rapid proliferation of cryptographic techniques. Various analysis and attack techniques were researched in this era to break the secret codes. With the advances taking place in this field, government organizations, military units, and some corporate houses started adopting the applications…

  • Hieroglyph − Oldest Cryptographic Technique

    The first known evidence of cryptography can be traced to the use of ‘hieroglyph’. Some 4000 years ago, the Egyptians used to communicate by messages written in hieroglyph. This code was the secret known only to the scribes who used to transmit messages on behalf of the kings. One such hieroglyph is shown below. Later,…

  • Origin of Cryptography

    Human being from ages had two inherent needs − (a) to communicate and share information and (b) to communicate selectively. These two needs gave rise to the art of coding the messages in such a way that only the intended people could have access to the information. Unauthorized people could not extract any information, even…

  • HLHB Trend-Catcher System Review

    The HLHB is back to making profits on GBP/USD! And did it just make MORE profits on USD/JPY when it was in a range? 2021’s numbers are in and I’m happy to report that the HLHB made profits from all three of the major pairs that I’m watching. If you’ve just tuned in, know that…

  • Inside Bar Momentum Strategy 2.0

    This strategy had a stellar run in Q3, so the bar has been set pretty high for Q4. Did it finish 2021 strong? Here are the numbers! If this is the first time you’re reading about this strategy, I suggest you take a look at the system rules before reading on. Also, this version makes use of an…