Why there is such thing called Quantum Mechanics ? Since the classical Newtonian physics fails while considering behavior of a system; that is very small, that travels very fast, that subjects very strong gravity etc. in early 1900's German physicist Max Planck publishes his study "the effect of radiation on a blackbody substance" and introduced … Continue reading I. Introduction to Quantum Mechanics

# Author: O.S. Tapsin

After mentioned about Asymmetric Cryptography overview, with this article we are going to touch on D-H key exchange, at first, we are going to take a look at discrete logarithm. Discrete Logarithm We know that, for any numbers "a" & "b" and any function "y" such that y = a^(b) can be described as b … Continue reading IX. Diffie-Hellman(-Merkle) Key Exchange

Prime Factorization Consider prime numbers "p" and "q " such that, there exist a number "n", multiple of "p"and "q" (p x q = n). Now, let's consider very large prime numbers (e.g. 300 digits long ) "p" and "q" such that, there exist a very large number (e.g. 4000 digits long) "n",multiple of "p"and … Continue reading VIII. RivestShamirAdleman / RSA Cipher

Invention -Asymmetric Key Cryptography The main idea on the development of Asymmetric Key Cryptography, was to avoid two problems, key distribution and digital signatures. Although it was first discovered by M. J. Williamson who worked under GCHQ, his work was kept secret. Few years later, it was first published by W. Diffie and M. Hellman … Continue reading VII. Asymmetric Cryptography: Overview

Why there are Operation Modes for Block Ciphers ? Simply, operation modes are methods that allow the safe use of a block of passwords under a single key. They were created specifically for use in encryption and authentication. Although they are associated with symmetric cryptography, in theory, they can also be used in public key … Continue reading VI. Operation Modes For Block Ciphers

To use below python code, copy & paste to any text editor (e.g. Sublime Text) as a python file. Then, all you need to do is to run on your command line or terminal (Pyhton3 needs to be installed). Have Fun ! #DataEncryptionStandard Encryption Protocol Python(3.6) Implementation by otapsin for CryptoQuantus. #Adapted from, ""https://academic.csuohio.edu/yuc/security/Chapter_06_Data_Encription_Standard.pdf"" #Initial … Continue reading DES Python Script

2-DES (Double) Double-DES has two different encryption phases with two different keys (K_1, K_2) such that: Ciphertext (Encryption): Enc (K2, Enc(K1, P)) Plaintext (Decryption): Dec(K1, Dec(K2, C)) Meet in the Middle Attack Meet-in-the-middle is a known plaintext attack, that targets block cipher cryptographic functions, relies on exponentially reducing the number of brute force permutations required to … Continue reading V. 2,3-DES & AES

Before getting started with Block Cipher, digital computer communications based on bits, where 1 byte equals 8 bits. For instance, the word cryptoquantus consist of 13 characters (byte), so it equals to 8x13 = 104 bits . ASCII (American Standard Code for Information Interchange) is an encoding representing each typed character by a number, where … Continue reading IV. Block Cipher & DES

First Transposition Cipher in History It was firstly used by Greeks and Spartans for military secrecy, 15th Century B.C. as Scytale Cipher. A Scytale Cipher is simply a wooden stick around which a strip of leather is wrapped. Sender writes the message along the length of the stick and unwinds the strip, where letters are … Continue reading III. Transposition Cipher

Supermassive Black Hole (SMBH) at the center of M87 (a.k.a Virgo A), April 10th 2019 by Katie Bouman What is a Black Hole ? Briefly, a Black Hole is nothing but an empty space that is a great amount of matter packed into a very small area where the gravitational field of a black hole is so … Continue reading Introduction to Black Holes