Posts tagged "cryptography"

10 posts tagged with cryptography.

Argon2 vs Bcrypt vs Scrypt: Which Password Hash Should You Use?
securitypasswordscryptographycomparison
Argon2 vs Bcrypt vs Scrypt: Which Password Hash Should You Use?

Modern password hashing has three serious contenders. We compare Argon2, bcrypt, and scrypt on memory hardness, GPU resistance, ecosystem support, and OWASP's current recommendation.

May 9, 2026 ·9 min read
How Bcrypt Hashes Passwords (And Why Cost Factor Matters)
securitypasswordscryptographyhashing
How Bcrypt Hashes Passwords (And Why Cost Factor Matters)

Bcrypt is the password-hashing standard most modern apps still rely on. Here's how the Blowfish-based KDF works, why the cost factor matters, and how to pick a value that ages well as hardware speeds up.

May 9, 2026 ·9 min read
How PGP Encryption Works: Keys, Trust, and Real-World Use
securitycryptographyemailpgp
How PGP Encryption Works: Keys, Trust, and Real-World Use

PGP (and OpenPGP) has secured email and files since 1991. We explain key pairs, the web of trust, signing vs encrypting, and where PGP still makes sense in 2026.

May 9, 2026 ·8 min read
How TOTP Two-Factor Authentication Works (RFC 6238)
securityauthentication2facryptography
How TOTP Two-Factor Authentication Works (RFC 6238)

Those six-digit codes from Google Authenticator, Authy, and 1Password are not magic. They're HMAC over a clock. Here's the precise algorithm, the security model, and why drift handling matters.

May 9, 2026 ·9 min read
Digital Signatures and PDF Security: How They Actually Work
pdfsecuritysignaturescryptography
Digital Signatures and PDF Security: How They Actually Work

A PDF digital signature is not a scanned image of your handwriting — it is a cryptographic proof tied to a certificate. Here is what it actually verifies and what it does not.

April 8, 2026 ·9 min read
How TLS and HTTPS Work: From Handshake to Encrypted Connection
tlshttpssecuritycryptography
How TLS and HTTPS Work: From Handshake to Encrypted Connection

Every HTTPS connection starts with a TLS handshake — a sub-second ceremony that establishes identity and agrees on encryption keys. Here is the full sequence in plain English.

February 15, 2026 ·11 min read
Public Key Cryptography Explained Simply: Keys, Ciphers, and Signatures
cryptographysecuritytlsencryption
Public Key Cryptography Explained Simply: Keys, Ciphers, and Signatures

The magic behind HTTPS, SSH, and PGP encryption is public key cryptography — a system where you can encrypt a message that only the intended recipient can decrypt. Here is how it works.

February 11, 2026 ·10 min read
Hashing Algorithms Explained: MD5, SHA-256, bcrypt — When to Use Which
hashingsecuritycryptographypasswords
Hashing Algorithms Explained: MD5, SHA-256, bcrypt — When to Use Which

MD5 and bcrypt are both called hashing algorithms, but they serve completely different purposes. This guide explains what makes a hash function suitable for checksums versus password storage.

January 29, 2026 ·10 min read
Encoding vs Encryption vs Hashing: The Key Differences Explained
securitycryptographyencodinghashing
Encoding vs Encryption vs Hashing: The Key Differences Explained

Treating Base64 as encryption or MD5 as a secure hash are among the most common security mistakes developers make. This post draws a clear line between encoding, encryption, and hashing.

January 19, 2026 ·8 min read
How Random Number Generation Works in Computing
randomalgorithmscryptographycomputing
How Random Number Generation Works in Computing

Math.random() and /dev/urandom look similar but are fundamentally different. One is suitable for games, one for cryptography. Understanding why that distinction matters prevents serious security mistakes.

January 15, 2026 ·9 min read