Cryptography terms
The mathematics keeping secrets in an adversarial world
Cryptography is the foundation of secure communication, authentication, and data integrity across the internet. This category covers symmetric and asymmetric encryption, hashing, digital signatures, TLS, key exchange protocols, and the common mistakes developers make when implementing or misapplying cryptographic primitives. Use libraries — but understand what they are doing.
🤖 AI Guestbook — Cryptography educational data only
|
|
Last 30 days
Agents 3
Amazonbot 161Perplexity 101Google 41Unknown AI 36Ahrefs 36SEMrush 19ChatGPT 7Majestic 5
Most referenced — Cryptography
How they use it
crawler 385
crawler_json 17
pre-tracking 4
Category total406 pings
Terms pinged16 / 16
Distinct agents7
An OAuth 2.0 extension that prevents authorisation code interception attacks in public clients (SPAs, mobile apps) by binding each authorisation request to a cryptographic secret the client generates.
1mo ago
cryptography intermediate
The end-to-end process of generating, validating, issuing, deploying, monitoring, and renewing a TLS certificate — and what breaks at each stage when it goes wrong.
1mo ago
cryptography intermediate
Block Cipher Modes PHP 7.1+
How a block cipher (AES) processes data larger than one block — ECB is insecure, CBC requires a MAC, GCM provides authenticated encryption and is the correct choice.
2mo ago
cryptography advanced
Certificate Transparency Logs
Public append-only logs of all issued TLS certificates — enabling detection of misissuance and rogue certificates within hours rather than months.
2mo ago
cryptography advanced
Cryptographic Hash Functions PHP 5.1+
One-way functions producing a fixed-length digest — SHA-256, SHA-3, and BLAKE3 are secure for data integrity; MD5 and SHA-1 are broken and must not be used for security.
2mo ago
cryptography intermediate
Cryptography Common Mistakes PHP 7.1+
IV reuse, ECB mode, rolling your own crypto, timing vulnerabilities, and SHA-256 for passwords — the most frequent implementation errors.
2mo ago
cryptography intermediate
Encryption in Transit
Encrypting data moving between systems using TLS — protecting against interception, tampering, and man-in-the-middle attacks on all network communication.
2mo ago
cryptography intermediate
Post-Quantum Cryptography
CRYSTALS-Kyber (ML-KEM) and CRYSTALS-Dilithium (ML-DSA) standardised by NIST in 2024 — designed to resist attacks from quantum computers.
2mo ago
cryptography advanced
Secret Sharing — Shamir's Scheme
Splitting a secret into N shares where any K can reconstruct it — preventing single points of failure for root encryption keys and disaster recovery credentials.
2mo ago
cryptography advanced
A cryptographic system with a public key (shared freely) and a private key (kept secret) — data encrypted with the public key can only be decrypted with the private key.
2mo ago
cryptography advanced
Cryptographic proof that data was created by the holder of a private key and has not been altered — providing authentication, integrity, and non-repudiation.
2mo ago
cryptography advanced
Encrypting stored data so that physical access to storage media does not expose plaintext — protecting against data theft from stolen drives, decommissioned hardware, and storage breaches.
2mo ago
cryptography advanced
JWT Deep Dive PHP 7.0+
JSON Web Tokens carry signed (or encrypted) claims — three Base64url-encoded sections: header.payload.signature. Security depends entirely on algorithm choice and verification correctness.
2mo ago
cryptography advanced
Key Derivation Functions PHP 5.5+
KDFs (PBKDF2, bcrypt, scrypt, Argon2) derive a cryptographic key from a password by being intentionally slow — making brute-force attacks computationally infeasible.
2mo ago
cryptography advanced
Public Key Infrastructure (PKI)
The system of certificate authorities, certificates, and protocols that establishes trust in public keys — enabling HTTPS, code signing, and email encryption at internet scale.
2mo ago
cryptography advanced
Symmetric Encryption PHP 7.2+
Encryption where the same key encrypts and decrypts data — fast and suitable for bulk data, but key distribution is the primary challenge.
2mo ago
cryptography advanced