Skip to content
ADHDecode
  1. Home
  2. Articles
  3. Cryptography

Cryptography Articles

157 articles

What Is SNI? Server Name Indication and HTTPS Virtual Hosting

2 min read

Manage Cryptographic Keys on Linux with the Kernel Keyring

3 min read

Generate and Use Nonces and IVs Correctly in AES and ChaCha20

2 min read

The Cryptography Behind OAuth 2.0 and PKCE

3 min read

OpenSSL Commands Every Developer Should Know

3 min read

Padding Oracle Attacks: How They Work and How to Prevent Them

12 min read

Hash Passwords Correctly: bcrypt, Argon2, and scrypt Compared

4 min read

Perfect Forward Secrecy: Why Past Sessions Stay Safe Even If Keys Leak

3 min read

Post-Quantum Algorithms: ML-KEM, ML-DSA, and SLH-DSA Explained

3 min read

PKI Explained: Certificates, CAs, and Trust Chains

2 min read

Encrypt and Sign Data in Python with the cryptography Library

3 min read

Generate Cryptographically Secure Random Numbers in Any Language

3 min read

Prevent Replay Attacks with Nonces, Timestamps, and HMAC

4 min read

RSA Algorithm Explained: Key Generation, Encryption, and Signatures

4 min read

Split Secrets Securely with Shamir's Secret Sharing

1 min read

Side-Channel Attacks: Cache Timing, Power Analysis, and Countermeasures

4 min read

SSH Key Algorithms Compared: RSA, Ed25519, ECDSA, and DSA

2 min read

Symmetric Encryption Explained: AES, ChaCha20, and Key Management

2 min read

Write Constant-Time Code to Prevent Timing Attacks

4 min read

The Cryptography Inside TLS: Handshake, Keys, and Cipher Suites

3 min read

JWT Guide: Structure, Signing, Verification, and Security Pitfalls

5 min read

Encrypt Secrets in HashiCorp Vault with Transit Engine

2 min read

X.509 Certificates Explained: Fields, Extensions, and Validation

3 min read

Zero-Knowledge Proofs: Prove You Know Something Without Revealing It

3 min read

AEAD Explained: Encrypt and Authenticate Data in One Step

4 min read

AES Encryption Guide: Modes, Key Sizes, and When to Use Each

5 min read

Asymmetric Encryption Explained: Public Keys, Private Keys, and RSA

2 min read

Encrypt and Manage Keys on AWS with KMS

3 min read

bcrypt vs Argon2: Choose the Right Password Hashing Algorithm

3 min read

Block Cipher Modes Explained: ECB, CBC, CFB, OFB, and GCM

3 min read

AES-CBC vs AES-GCM vs AES-CTR: When to Use Each Mode

5 min read

Set Up a Private Certificate Authority with OpenSSL

3 min read

Meet FIPS 140-2 Compliance Requirements for Cryptographic Modules

2 min read

Build Crypto Agility So You Can Swap Algorithms Without Rewriting Everything

4 min read

How Diffie-Hellman Key Exchange Works: The Math Made Simple

3 min read

Digital Signatures Explained: Sign, Verify, and Trust

3 min read

Use ECDH for Ephemeral Key Agreement in Your Protocol

3 min read

Ed25519 vs RSA: Which Key Algorithm to Use for SSH and Signing

3 min read

ECDSA Explained: Elliptic Curve Digital Signatures in Practice

3 min read

Protect Data with Envelope Encryption and KMS

2 min read

Cryptography Fundamentals: Symmetric, Asymmetric, Hashing, and MACs

3 min read

Encrypt and Decrypt Files with GPG from the Command Line

2 min read

Sign and Verify GPG Keys to Build a Web of Trust

2 min read

GPG and PGP Explained: Encrypt Emails and Files That Actually Stay Private

2 min read

Hash Functions Explained: SHA-256, SHA-3, and When to Use Each

3 min read

Authenticate Messages with HMAC to Prevent Tampering

3 min read

JWT Security Vulnerabilities: None Algorithm, alg Confusion, and More

4 min read

Key Derivation with PBKDF2 and bcrypt: Harden Passwords Before Storage

3 min read

Manage Cryptographic Keys Securely with HSMs and KMS

3 min read

Key Rotation Strategy: How Often, How, and Without Downtime

3 min read

Post-Quantum Cryptography: Kyber and Dilithium in Practice

3 min read

Set Up LUKS Full-Disk Encryption on Linux Step by Step

1 min read

Adversarial Examples: How Tiny Pixel Changes Fool Neural Networks

2 min read

Defend ML Models Against Adversarial Attacks with Adversarial Training

3 min read

Run ML Inference on Encrypted Data with Homomorphic Encryption

3 min read

What Are the Best Books to Learn Cryptography? 5 Books for 5 Goals

1 min read

What Is Cryptography in the CISSP Exam? Domain 3 Decoded

3 min read

What Is Cryptographer Salary? What the Field Actually Pays in 2026

3 min read

What Is the Difference Between a Cryptographer and a Security Engineer?

3 min read

What Encryption Does GDPR Require? Data Protection by Design Explained

3 min read

What Encryption Does HIPAA Actually Require? A Developer's Plain-English Guide

2 min read

What Is the History of AES? How the US Government Picked a Cipher

3 min read

The History of Cryptography: From Caesar Cipher to AES

3 min read

What Is the Diffie-Hellman Key Exchange? The 1976 Idea That Changed Security Forever

3 min read

How Do Rainbow Table Attacks Work? (And How Salt Stops Them)

4 min read

How Does AES Encryption Work?

3 min read

How Does Bitcoin Cryptography Work? Keys, Wallets, and Signatures Decoded

3 min read

How Does Blockchain Cryptography Work?

3 min read

How Does Code Signing Work?

3 min read

How Does Diffie-Hellman Key Exchange Work?

2 min read

How Does Elliptic Curve Cryptography Work?

3 min read

How Does Email Encryption Work? PGP and S/MIME Explained

3 min read

How Does Forward Secrecy Work? (And Why It Matters If You Get Hacked)

3 min read

How Does Full Disk Encryption Work? BitLocker, FileVault, and LUKS Explained

4 min read

How Does HTTPS Work? From URL to Encrypted Connection

3 min read

How Does iMessage Encryption Work? Apple's End-to-End Protocol Explained

2 min read

What Is Kerberos? Network Authentication Without Sending Passwords

2 min read

How Does Key Derivation Work? PBKDF2, bcrypt, Argon2 Explained

4 min read

How Does Passkey Cryptography Work? The Tech Behind Password-Free Login

2 min read

How Does Password Hashing Work? (And Why Storing Plain Passwords Is Criminal)

4 min read

How Does RSA Encryption Work?

3 min read

How Does SHA-256 Work?

2 min read

How Does Signal's Encryption Work? The Double Ratchet Explained

4 min read

How Does SSH Encryption Work?

2 min read

How Does Tor Work? The Cryptography of Anonymous Browsing

3 min read

How Does WhatsApp Encryption Work? Signal Protocol in a Meta App

3 min read

How Does Zero-Knowledge Proof Work? A Simple Explanation

3 min read

How to Become a Cryptographer: The Honest Roadmap

2 min read

How to Choose the Right Encryption Algorithm for Your Project

3 min read

How to Generate an RSA Key Pair (and What to Do With It)

1 min read

How to Implement AES Encryption in Python

3 min read

How to Implement HMAC Authentication in an API

5 min read

How to Migrate to Post-Quantum Cryptography: A Practical Guide

3 min read

How to Set Up HTTPS on Your Website (Complete Guide)

3 min read

How to Verify a Digital Signature

2 min read

What Is the Enigma Machine? How Nazi Germany's Cipher Was Broken

3 min read

Is 3DES Still Secure? (Spoiler: No)

5 min read

Is AES-256 Secure? What the Experts Actually Say

2 min read

Is AES Safe Against Quantum Computers?

3 min read

Is End-to-End Encryption Really Private? What the Platform Can Still See

3 min read

Is MD5 Still Safe to Use?

3 min read

Is RSA Still Secure in 2026?

2 min read

Is SHA-1 Broken? What the SHAttered Attack Means

3 min read

Is WEP Encryption Broken? The Short Answer Is Yes

3 min read

What Math Do You Need for Cryptography? No PhD Required

3 min read

What Are the NIST Post-Quantum Standards? ML-KEM, ML-DSA, SLH-DSA Explained

3 min read

What Encryption Does PCI DSS Require? Credit Card Data Protection Decoded

4 min read

The Five Properties of Secure Cryptographic Hash Functions

3 min read

What Are Signed URLs? Time-Limited Access to Private Files

2 min read

What Is a Cryptographic Bill of Materials (CBOM)?

2 min read

What Is a Cipher? Ciphers, Encryption, and Codes Are Not the Same Thing

2 min read

What Is a Cryptographic Key? (And Why Size Actually Matters)

3 min read

What Is a Cryptographic Nonce?

2 min read

What Is a CSPRNG? Why Math.random() Will Get You Hacked

4 min read

What Is a CSR? How Certificate Signing Requests Actually Work

4 min read

What Is a Digital Signature? How Signing Actually Works

2 min read

What Is a Hash Function? Explained Without the Math

3 min read

What Is a Key Management System (KMS)?

3 min read

What Is a MAC? Message Authentication Codes and HMAC Explained

3 min read

What Is a Nonce Reuse Attack? Why One Reused Value Destroys Encryption

3 min read

What Is a Timing Attack? How Milliseconds Leak Your Secrets

2 min read

What Is a TPM? The Crypto Chip Inside Your Laptop

2 min read

What Is an HSM? Why Banks Lock Their Keys in Hardware

3 min read

What Is an Intermediate CA? How the Certificate Chain of Trust Works

3 min read

What Is API Key Security? Why API Keys Are Not Authentication

3 min read

What Is Argon2? The Password Hashing Algorithm That Won the Competition

3 min read

What Is ASCON? The NIST Lightweight Cryptography Standard

3 min read

What Is Asymmetric Encryption? Public and Private Keys Explained

2 min read

What Is Authenticated Encryption? AES-GCM Explained

3 min read

What Is bcrypt? The Battle-Tested Password Hashing Standard

2 min read

What Is BLAKE2? Why Developers Love It Over SHA-256

3 min read

What Is BLAKE3? The Fastest Cryptographic Hash Function

3 min read

What Is a Block Cipher Mode of Operation? ECB, CBC, and GCM Explained

4 min read

What Is ChaCha20-Poly1305? The Cipher Suite Powering Modern TLS

3 min read

What Is ChaCha20? The Stream Cipher That Beats AES on Mobile

3 min read

What Is Constant-Time Code? Writing Crypto That Doesn't Leak Via Timing

4 min read

What Is Cookie Security? The Secure, HttpOnly, and SameSite Flags Explained

3 min read

What Is Cryptanalysis? Breaking Codes as a Career

5 min read

What Is Crypto Agility? The Strategy for Switching Algorithms Without Breaking Everything

3 min read

What Is Entropy in Cryptography? Why Randomness Matters

3 min read

What Is CSRF Token Security? The Cryptography Behind Form Protection

2 min read

What Is a Certificate Transparency Log? How CT Keeps CAs Honest

3 min read

What Is Database Encryption? Column-Level, Full-Disk, and Application-Level

7 min read

What Is the Discrete Logarithm Problem? (Why Cryptography Is Hard)

3 min read

What Is DSA? The Original Government Digital Signature Standard

3 min read

What Is ECDH? Elliptic Curve Diffie-Hellman Explained

4 min read

What Is ECDSA? How Elliptic Curve Digital Signatures Work

3 min read

What Is Ed25519? The Fastest Digital Signature Algorithm

2 min read

What Is End-to-End Encryption? (And Does Your App Actually Have It?)

2 min read

What Is FIDO2 and WebAuthn? Passwordless Authentication Explained

3 min read

What Is FIPS 140? The US Government Cryptography Standard Explained

3 min read

What Is FN-DSA (Falcon)? The Compact Post-Quantum Signature Scheme

2 min read

What Is Format-Preserving Encryption? Encrypting Credit Cards That Still Look Like Credit Cards

3 min read

What Is Fully Homomorphic Encryption (FHE)?

3 min read

What Is Harvest Now, Decrypt Later? The Threat You Can't See Coming

3 min read

What Is the Heartbleed Bug? The OpenSSL Flaw That Leaked the Internet

3 min read

What Is HMAC for API Authentication? Signing Requests the Right Way

4 min read

What Is Homomorphic Encryption? The Holy Grail of Privacy-Preserving Computation

3 min read

What Is Homomorphic Encryption? Computing on Encrypted Data

3 min read

What Is HQC? The New Post-Quantum KEM NIST Selected in 2025

3 min read

What Is HSTS Preloading? Locking Your Domain Into HTTPS Forever

2 min read

What Is HSTS? HTTP Strict Transport Security Explained

3 min read

What Is IV Reuse? The One Mistake That Breaks AES-GCM Completely

3 min read

What Is a Key Encapsulation Mechanism (KEM)? The Concept Behind Post-Quantum Key Exchange

2 min read

What Is Key Rotation? Why You Can't Just Generate One Key and Forget It

3 min read

What Is Key Stretching? How PBKDF2 Works

2 min read

What Is Lattice-Based Cryptography? The Math Behind Post-Quantum

5 min read

What Is Lightweight Cryptography? Encryption for Devices That Can't Run AES

3 min read

What Is CRYSTALS-Dilithium (ML-DSA)? Post-Quantum Signatures Explained

3 min read

What Is CRYSTALS-Kyber (ML-KEM)? The Algorithm That Protects Against Quantum Attacks

3 min read

What Is Non-Repudiation? Why 'I Didn't Send That' Doesn't Work Anymore

2 min read

What Is the NSA Suite B? The Military Cryptography Standard Behind Modern Algorithms

3 min read

What Is a Padding Oracle Attack?

6 min read

What Is PEM Format? Why Certificates Look Like Base64 Gibberish

1 min read

What Is PKCS#12? How to Bundle a Certificate and Private Key Together

3 min read

What Is Plaintext and Ciphertext?

3 min read

What Is Poly1305? The MAC That Makes ChaCha20 Complete

2 min read

What Is Post-Quantum Cryptography? A Beginner's Guide

3 min read

What Is Public Key Cryptography? The Idea That Changed Everything

4 min read

What Is Quantum Key Distribution (QKD)?

3 min read

What Is SAML? Enterprise Single Sign-On and Its XML Signatures

3 min read

What Is scrypt? The Memory-Hard Password Hashing Function

3 min read

What Is Secrets Management? How Developers Stop Leaking API Keys

5 min read

What Is Secure Multi-Party Computation?

3 min read

What Is Shannon's Perfect Secrecy? The Theory Behind Unbreakable Encryption

3 min read

What Is SLH-DSA (SPHINCS+)? The Hash-Based Post-Quantum Backup

3 min read

What Is Subresource Integrity (SRI)? How Browsers Verify CDN Scripts

1 min read

What Is Symmetric Encryption? How It Works and When to Use It

3 min read

What Is the ACME Protocol? How Certificates Get Issued Automatically

2 min read

What Is the BEAST Attack? How Predictable IVs Break TLS

3 min read

What Is the Bleichenbacher Attack? The RSA Oracle That Never Dies

5 min read

What Is the Caesar Cipher? Rome's Secret Messaging System

2 min read

What Is the CIA Triad? Confidentiality, Integrity, Availability Explained

2 min read

What Is the DROWN Attack? How Old SSLv2 Servers Broke Modern TLS

4 min read

What Is the EFAIL Attack? How Email Clients Leaked Encrypted Content

5 min read

What Is the FREAK Attack? When Export Crypto Came Back to Haunt Us

4 min read

What Is the Logjam Attack? Weak Diffie-Hellman Is Still Everywhere

3 min read

What Is the One-Time Pad? The Only Theoretically Unbreakable Cipher

4 min read

What Is the POODLE Attack? How SSL 3.0 Padding Was Exploited

2 min read

What Is the ROBOT Attack? Bleichenbacher's 1998 Exploit Returns

5 min read

What Is the Sweet32 Attack? Birthday Attacks on 64-Bit Block Ciphers

5 min read

What Is Threshold Cryptography? Splitting a Secret So No One Holds It All

2 min read

What Is Tokenization? How It Differs From Encryption for PCI Compliance

4 min read

What Is TOTP? How Authenticator Apps Generate 6-Digit Codes

2 min read

What Is X25519? The Key Exchange Protocol Built Into TLS 1.3

3 min read

What Is Zero-Knowledge Proof? You Can Prove You Know Something Without Saying It

4 min read

When Will Quantum Computers Break RSA? What We Actually Know

2 min read

Who Invented Public Key Cryptography? (It's Complicated)

4 min read

Why Will Quantum Computers Break Encryption? Shor's Algorithm Explained

3 min read
ADHDecode

Complex topics, finally made simple

Courses

  • Networking
  • Databases
  • Linux
  • Distributed Systems
  • Containers & Kubernetes
  • System Design
  • All Courses →

Resources

  • Cheatsheets
  • Debugging
  • Articles
  • About
  • Privacy
  • Sitemap

Connect

  • Twitter (opens in new tab)
  • GitHub (opens in new tab)

Built for curious minds. Free forever.

© 2026 ADHDecode. All content is free.

  • Home
  • Learn
  • Courses
Esc
Start typing to search all courses...
See all results →
↑↓ navigate Enter open Esc close