To use below python code, copy & paste to any text editor (e.g. Sublime Text) as a python file. Then, all you need to do is to run on your command line or terminal (Pyhton3 needs to be installed). Have Fun ! #DataEncryptionStandard Encryption Protocol Python(3.6) Implementation by otapsin for CryptoQuantus. #Adapted from, ""https://academic.csuohio.edu/yuc/security/Chapter_06_Data_Encription_Standard.pdf"" #Initial … Continue reading DES Python Script

2-DES (Double) Double-DES has two different encryption phases with two different keys (K_1, K_2) such that: Ciphertext (Encryption): Enc (K2, Enc(K1, P)) Plaintext (Decryption): Dec(K1, Dec(K2, C)) Meet in the Middle Attack Meet-in-the-middle is a known plaintext attack, that targets block cipher cryptographic functions, relies on exponentially reducing the number of brute force permutations required to … Continue reading V. 2,3-DES & AES

Before getting started with Block Cipher, digital computer communications based on bits, where 1 byte equals 8 bits. For instance, the word cryptoquantus consist of 13 characters (byte), so it equals to 8x13 = 104 bits . ASCII (American Standard Code for Information Interchange) is an encoding representing each typed character by a number, where … Continue reading IV. Block Cipher & DES

First Transposition Cipher in History It was firstly used by Greeks and Spartans for military secrecy, 15th Century B.C. as Scytale Cipher. A Scytale Cipher is simply a wooden stick around which a strip of leather is wrapped. Sender writes the message along the length of the stick and unwinds the strip, where letters are … Continue reading III. Transposition Cipher

Supermassive Black Hole (SMBH) at the center of M87 (a.k.a Virgo A), April 10th 2019 by Katie Bouman What is a Black Hole ? Briefly, a Black Hole is nothing but an empty space that is a great amount of matter packed into a very small area where the gravitational field of a black hole is so … Continue reading Introduction to Black Holes

Biography - An Expressionist Painter Chagall was born in Vitebsk, Russia (today's Belarus) in 1887, as the son of a very religious Hasidic-Jewish family, under the name Moshe Segall. He was the eldest of 8 siblings and had a happy childhood. In the early years of his life, he was mostly influenced by Jewish traditions … Continue reading Marc Chagall

Brute Force Attack As the name suggests, "Brute Force Attack", the process is based on testing all possible keys until find the correct key. Let's consider that the attacker finds out the correct key after trials. We have 4 keys such as, k_1-(00), k_2-(01), k_3-(10), k_4-(11) where information entropy of the system is 2 bits … Continue reading II. Information Entropy & Cryptography (Brute Force and Cryptanalysis)

Biography -Master of Abstract Art Movement Kandinsky was born on December 4th ( 16th in Gregorian calendar) , 1866 in Moscow. His father Wassily was a wealthy tea merchant whose family comes from the border region between Mongolia and Manchuria and his mother Lydia was comes from a noble Moscow family. Due to his parents interest … Continue reading Wassily Wassilyevich Kandinsky

Dr. C. Shannon Information Entropy The information entropy (a.k.a Shannon’s Entropy) describes the disorder of the system. Let’s consider coin flipping system, where there are two possibilities for output such as head or tail. Hence, we may consider the system with 1-bit information (e.g. “0” for head and “1” for tail) and there is %50 chance … Continue reading Information Entropy (Simplified)

Cryptography Terminology Cryptography, the study of encryption and decryption techniques. Cryptanalysis, codebreaking and deciphering ciphertext without the key. Cryptology, the field of cryptography and cryptology. Alice, Bob & Eve Framework Alice sends a message to Bob and Eve (stands for eaves dropper) wants to get the message. Here; there are, classical (e.g. Caesar cipher) and modern … Continue reading I. Cryptography: 101