CryptoTutorials: Part 3

August 16, 2011

By Israel Torres, a hacker at large with interests in the hacking realm and an author of crypto challenge: http://hakin9.israeltorres.org

In this third installment of CryptoTutorials we will introduce the concept of using a pseudo-random key system as an encryption mechanism.  Included is a basic exercise that uses the C programming language (and source file) to demonstrate how to encrypt and decrypt an arbitrary string with a key. Only with the key will the message be successfully decrypted in a timely fashion (ala poor manŐs one-time pad OTP).


What you will learn…
crypto fundamentals, how to use a key to encrypt your communications

What you should know…
basic C programming for programmatic implementation


Tagged with:

Leave a Comment

Please keep in mind that comments are moderated and rel="nofollow" is in use. So, please do not use a spammy keyword or a domain as your name, or it will be deleted. Let us have a personal and meaningful conversation instead.

You must be logged in to post a comment.

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa