Cryptography BhutanMono-alphabetic Cipher and its cryptanalysisMono-alphabetic cipher2 min read·Apr 23, 2021----
Cryptography BhutanCryptanalysis and Brute-force attackThe main objective of breaking the cipher is to discover the key rather than just recover the plaintext of a single ciphertext. This is…2 min read·Mar 19, 2021----
Cryptography BhutanCaesar CipherIn Caesar Cipher, to encrypt a plaintext(message), each plaintext characters are replaced by three letters down the alphabet. For example…2 min read·Mar 14, 2021----
Cryptography BhutanSymmetric CiphersSymmetric encipherment scheme has the following elements:2 min read·Mar 14, 2021----
Cryptography BhutanTechniques for hiding messagesThe CIA triad security goals can be achieved through the following two techniques:1 min read·Mar 14, 2021----
Cryptography BhutanSecurity MechanismsThe security mechanism is a process or device incorporating such a process that is designed to detect, prevent or recover from a security…1 min read·Mar 14, 2021----
Cryptography BhutanSecurity ServicesSecurity service is service provided by layers of communicating open systems which ensure adequate security of data storage system or data…1 min read·Mar 14, 2021----
Cryptography BhutanTypes of Security AttackPassive Attack: Security attacks such as eavesdropping or monitoring the transmission of data to obtain information without affecting the…1 min read·Mar 13, 2021----
Cryptography BhutanFamiliarization of JargonCryptography: The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their…2 min read·Mar 13, 2021----
Cryptography BhutanInformation SecurityIn this information era, we live in a world of information. Information is collected, curated, and sold like a commodity. Information has…1 min read·Mar 12, 2021----