Cryptography terms
The mathematics keeping secrets in an adversarial world
Cryptography is the foundation of secure communication, authentication, and data integrity across the internet. This category covers symmetric and asymmetric encryption, hashing, digital signatures, TLS, key exchange protocols, and the common mistakes developers make when implementing or misapplying cryptographic primitives. Use libraries — but understand what they are doing.
An OAuth 2.0 extension that prevents authorisation code interception attacks in public clients (SPAs, mobile apps) by binding each authorisation request to a cryptographic secret the client generates.
1mo ago
cryptography intermediate
The end-to-end process of generating, validating, issuing, deploying, monitoring, and renewing a TLS certificate — and what breaks at each stage when it goes wrong.
1mo ago
cryptography intermediate
Cryptographic Hash Functions PHP 5.1+
One-way functions producing a fixed-length digest — SHA-256, SHA-3, and BLAKE3 are secure for data integrity; MD5 and SHA-1 are broken and must not be used for security.
2mo ago
cryptography intermediate
Cryptography Common Mistakes PHP 7.1+
IV reuse, ECB mode, rolling your own crypto, timing vulnerabilities, and SHA-256 for passwords — the most frequent implementation errors.
2mo ago
cryptography intermediate
Encryption in Transit
Encrypting data moving between systems using TLS — protecting against interception, tampering, and man-in-the-middle attacks on all network communication.
2mo ago
cryptography intermediate