How to encrypt a message using a stickAncient Greeks developed an unusual method to encrypt sensitive messages.Dec 28, 2022A response icon4Dec 28, 2022A response icon4
A birthday in scarlet for cryptographyThe Birthday paradox is an intriguing brain teaser that has put worldwide cryptographers through the wringer.Dec 20, 2022Dec 20, 2022
The fascinating story behind the calculation of 𝝿The constant 𝝿 is everywhere. However, not everyone knows the intricate path that led us to its precise quantification.Dec 15, 2022A response icon2Dec 15, 2022A response icon2
Building a simple Merkle tree class in PythonMerkle trees are a hot topic in computer science. Discover how they work and how to implement one from scratch.Dec 10, 2022Dec 10, 2022
An introduction to hash functions for cryptographic gourmetHash functions are a ubiquitous component of modern cryptography. Here is a gentle introduction for connoisseurs (and not only).Dec 6, 2022Dec 6, 2022
Why most explanations of the Monty Hall problem are (partially) wrongThe Monty Hall problem has plenty of intuitive explanations. They are correct, but shallow. Here is why.Aug 31, 2022A response icon3Aug 31, 2022A response icon3
Protective MACs for the pouring rain of cryptographic banditsAn encrypted message requires an additional procedure to guarantee the integrity of the transmitted text.Aug 26, 2022Aug 26, 2022
The best way to encrypt a book using modern cryptographyOnce in a lifetime, we all get stuck while choosing the encryption mode to protect our books’ privacy.Aug 21, 2022A response icon1Aug 21, 2022A response icon1
The quest for true randomnessComputer scientists had to deal with the millenary problem of finding a source of true randomness. Here is what they discovered.Aug 16, 2022A response icon7Aug 16, 2022A response icon7