How Cryptography Secures Digital Communication

What is Cryptography?

Cryptography is a technique used to transform plaintext (normal readable data) into ciphertext (encoded or unreadable data) using special algorithms and keys. This process is called encryption. The encrypted data can only be converted back into its original form using a key through a process called decryption.

For example, when you send a message online, cryptography encrypts the message so that even if someone intercepts it, they cannot understand the information without the

Read More

Essential Numerical Methods with C Examples

Essential Numerical Methods with C Examples

1. Newton-Raphson (Nonlinear Equation)

Algorithm (Very Simple Version)

  1. Read starting guess (x)
  2. Read tolerance (how small the error should be)
  3. Repeat many times:
    1. Calculate function value f(x)
    2. Calculate slope f'(x)
    3. If slope is almost zero → stop (bad)
    4. New x = x − f(x) / f'(x)
    5. If change is very small → stop (found answer)
  4. Show the root

C

#include <stdio.h>
#include <math.h>

double f(double x){ return x*x*x - 2*x - 5; }
double df(double x){ return 3*
Read More

Essential Concepts in Modern Cybersecurity

1. Proving Euler’s Theorem: Example (a=3, n=10)

Euler’s Theorem Statement:
If the greatest common divisor gcd(a, n) = 1, then the following congruence holds:
a^φ(n) ≡ 1 (mod n)

Step 1: Check GCD Condition

gcd(3, 10) = 1 ✅ (Condition met)

Step 2: Compute Euler’s Totient Function φ(10)

Prime factorization of 10: 10 = 2 × 5

Using the multiplicative property of φ:
φ(10) = φ(2) × φ(5) = (2-1) × (5-1) = 1 × 4 = 4

Step 3: Substitute into the Theorem

We need to verify: 3^φ(10) = 3^4

Step 4: Compute

Read More

Understanding Hacker Ethics and Cryptography Techniques

Hacker: Someone who seeks to understand how systems work and finds ways to make them do things they weren’t originally designed to do. Security depends on maintenance and verification, not trust.

Social Engineering: Manipulating people into revealing confidential info (pretexting, phishing, smishing, etc).

Encryption: Converts plaintext to ciphertext.

Decryption: Restores plaintext using a key.

Cipher: Algorithm pair for encryption and decryption.

Key: Secret value that controls the cipher. DES (56

Read More

Understanding IoT Security Concepts and Terminology

Lectures 1–3

IoT (Internet of Things) – interconnected physical devices exchanging data.

MMU (Malfunction Management Unit) – hardware failsafe.

Invariant – rule defining safe system states.

NTCIP – network protocol for traffic signal controllers.

DoS / DDoS – denial of service (resource flooding).

Replay Attack – reuse of old valid data packets.

Eavesdropping – intercepting communication.

Injection Attack – unauthorized commands/data inserted.

Tampering – altering transmitted or stored

Read More

Cryptography and Network Security Fundamentals

Cryptanalysis: Principles and Attacks

Definition

Cryptanalysis is the process of studying and breaking encryption to recover plaintext or the secret key without knowing the key.

Purpose

The purpose of cryptanalysis is to find weaknesses in a cryptographic algorithm, recover hidden plaintext or keys, check how strong the encryption is, and determine how easily an attacker can exploit the system.

Working Process

  1. Attacker collects ciphertext.
  2. Makes guesses or analyzes patterns in the encryption.
  3. Tries decrypting
Read More