← CodeClarityLab Home
Browse by Category
+ added · updated 7d
🤖 AI Guestbook — Cryptography educational data only
| |
Last 30 days
2 pings — 2026-04-08 W 3 pings — 2026-04-09 T 9 pings — 2026-04-10 F 3 pings — 2026-04-11 S 5 pings — 2026-04-12 S 7 pings — 2026-04-13 M 0 pings — 2026-04-14 T 0 pings — 2026-04-15 W 0 pings — 2026-04-16 T 9 pings — 2026-04-17 F 4 pings — 2026-04-18 S 11 pings — 2026-04-19 S 8 pings — 2026-04-20 M 0 pings — 2026-04-21 T 1 ping — 2026-04-22 W 2 pings — 2026-04-23 T 17 pings — 2026-04-24 F 16 pings — 2026-04-25 S 4 pings — 2026-04-26 S 0 pings — 2026-04-27 M 4 pings — 2026-04-28 T 3 pings — 2026-04-29 W 2 pings — 2026-04-30 T 25 pings — 2026-05-01 F 7 pings — 2026-05-02 S 6 pings — 2026-05-03 S 2 pings — 2026-05-04 M 4 pings — 2026-05-05 T 1 ping — Yesterday W 3 pings — Today T
Amazonbot 161Perplexity 101Google 41Unknown AI 36Ahrefs 36SEMrush 19ChatGPT 7Majestic 5
crawler 385 crawler_json 17 pre-tracking 4
Category total406 pings Terms pinged16 / 16 Distinct agents7
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Diagram: OAuth 2.0 PKCE — Proof Key for Code Exchange OAuth 2.0 PKCE — Proof Key for Code Exchange PHP 7.0+
An OAuth 2.0 extension that prevents authorisation code interception attacks in public clients (SPAs, mobile apps) by binding each authorisation request to a cryptographic secret the client generates.
1mo ago cryptography intermediate
Diagram: TLS Certificate Lifecycle TLS Certificate Lifecycle
The end-to-end process of generating, validating, issuing, deploying, monitoring, and renewing a TLS certificate — and what breaks at each stage when it goes wrong.
1mo ago cryptography intermediate
Block Cipher Modes PHP 7.1+
How a block cipher (AES) processes data larger than one block — ECB is insecure, CBC requires a MAC, GCM provides authenticated encryption and is the correct choice.
2mo ago cryptography advanced
Certificate Transparency Logs
Public append-only logs of all issued TLS certificates — enabling detection of misissuance and rogue certificates within hours rather than months.
2mo ago cryptography advanced
Cryptographic Hash Functions PHP 5.1+
One-way functions producing a fixed-length digest — SHA-256, SHA-3, and BLAKE3 are secure for data integrity; MD5 and SHA-1 are broken and must not be used for security.
2mo ago cryptography intermediate
Cryptography Common Mistakes PHP 7.1+
IV reuse, ECB mode, rolling your own crypto, timing vulnerabilities, and SHA-256 for passwords — the most frequent implementation errors.
2mo ago cryptography intermediate
Encryption in Transit
Encrypting data moving between systems using TLS — protecting against interception, tampering, and man-in-the-middle attacks on all network communication.
2mo ago cryptography intermediate
Post-Quantum Cryptography
CRYSTALS-Kyber (ML-KEM) and CRYSTALS-Dilithium (ML-DSA) standardised by NIST in 2024 — designed to resist attacks from quantum computers.
2mo ago cryptography advanced
Secret Sharing — Shamir's Scheme
Splitting a secret into N shares where any K can reconstruct it — preventing single points of failure for root encryption keys and disaster recovery credentials.
2mo ago cryptography advanced
Diagram: Asymmetric Encryption Asymmetric Encryption PHP 5.0+
A cryptographic system with a public key (shared freely) and a private key (kept secret) — data encrypted with the public key can only be decrypted with the private key.
2mo ago cryptography advanced
Diagram: Digital Signatures Digital Signatures PHP 5.0+
Cryptographic proof that data was created by the holder of a private key and has not been altered — providing authentication, integrity, and non-repudiation.
2mo ago cryptography advanced
Diagram: Encryption at Rest Encryption at Rest PHP 7.0+
Encrypting stored data so that physical access to storage media does not expose plaintext — protecting against data theft from stolen drives, decommissioned hardware, and storage breaches.
2mo ago cryptography advanced
JWT Deep Dive PHP 7.0+
JSON Web Tokens carry signed (or encrypted) claims — three Base64url-encoded sections: header.payload.signature. Security depends entirely on algorithm choice and verification correctness.
2mo ago cryptography advanced
Key Derivation Functions PHP 5.5+
KDFs (PBKDF2, bcrypt, scrypt, Argon2) derive a cryptographic key from a password by being intentionally slow — making brute-force attacks computationally infeasible.
2mo ago cryptography advanced
Public Key Infrastructure (PKI)
The system of certificate authorities, certificates, and protocols that establishes trust in public keys — enabling HTTPS, code signing, and email encryption at internet scale.
2mo ago cryptography advanced
Symmetric Encryption PHP 7.2+
Encryption where the same key encrypts and decrypts data — fast and suitable for bulk data, but key distribution is the primary challenge.
2mo ago cryptography advanced
✓ schema.org compliant