How AES Encrypts/Decrypts A Long Message
In the previous topic, we got idea that how AES encrypts/decrypts plaintext with 16 bytes length. However, what happens when the plaintext exceeds 16 bytes? ECB (Electronic Codebook): In ECB…
In the previous topic, we got idea that how AES encrypts/decrypts plaintext with 16 bytes length. However, what happens when the plaintext exceeds 16 bytes? ECB (Electronic Codebook): In ECB…
AES also known by its original name Rijndael is a symmetric block cipher algorithm, which means the sender and receiver use the same key for encryption and decryption. AES operates on…
DSA taking a expensive computation operation because it uses modular exponentiation and modular inverse. So in the small computer like microcontroller, we need the light weight algorithms. Elliptic Curve Digital…
What is a digital signature? In the physical world, document verification is done through signatures. For example, if you send me a document with your signature, I trust its authenticity…
RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. It's also used in TLS handshake. The foundation of RSA lies in asymmetric encryption, where a key…
In the preceding sections, we explored the concept and properties of Elliptic Curve Finite Fields. In this topic, we dive into an application of the Elliptic-Curve Diffie–Hellman (ECDHE) which is…
In the previous topic, we already know what is Elliptic Curves. Now, we go further with the Elliptic Curves Over Finite Fields. Modulo \( \text{When a number modulo a number…
I wrote this series because I am inquisitive about some strange things in the TLS series. Elliptic-curve Diffie–Hellman (ECDHE) is one of them. Please check TLS-part 1 to get the details.…
What is WolfSSL? If you are an embedded developer, you might be familiar with mbedTLS, a widely used TLS library for embedded systems. However, mbedTLS is not the only option.…
When developing or testing a website or application that requires secure communication over HTTPS, you might need a certificate to encrypt the data and authenticate the server. However, obtaining a…