Karuppusamy SThe Unsung Hero of Digital security: Understanding Public Key Infrastructure (PKI) and Digital…INTRODUCTION: In the world of security implementation, Public Key Infrastructure (PKI) is an unsung hero. It enables users on a public…Jul 4Jul 4
Karuppusamy S“Why ECB Mode is Unsafe for Encrypting Large Messages”Introduction: Block Cipher: A block cipher is an algorithm that encrypts blocks of a fixed length. The encryption function denoted as E…May 21May 21
Karuppusamy SFrom HTTP to HTTPS: Safeguarding Data with Public Key CryptographyIntroduction to HTTP and HTTPSApr 1Apr 1
Karuppusamy S2014–11–23 — Traffic analysis exercise — Questions about EK traffic.Analyzing Malicious Traffic: A Practical GuideMar 41Mar 41
Karuppusamy SMalware traffic analysis [2014-11-16]Analyzing Malicious Traffic: A Practical GuideFeb 9Feb 9
Karuppusamy STHREE WAY HANDSHAKEHello everyone I am here to give a simple and clear way to understand the three way handshaking [Establishing Connections with TCP]Jan 11Jan 11
Karuppusamy SWHAT IS BASE64?Consider an example of “HELLO” The word “HELLO” will be converted into computer-readable language that is the binary value is H -01001000…Apr 8, 2023Apr 8, 2023