DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AIDE in Motion Automating and Signing System Integrity Checks

AIDE in Motion Automating and Signing System Integrity Checks

Comments
5 min read
AES Algorithm for beginners

AES Algorithm for beginners

Comments
11 min read
Cryptography in 2025: The Quantum Leap and the AI Arms Race

Cryptography in 2025: The Quantum Leap and the AI Arms Race

Comments
3 min read
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Comments
4 min read
Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Comments
10 min read
Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

4
Comments
9 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy

How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy

Comments
8 min read
Secure Remote Password (SRP) protocol

Secure Remote Password (SRP) protocol

4
Comments
14 min read
Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

2
Comments
3 min read
Cryptography for developers

Cryptography for developers

2
Comments
3 min read
Bracing for Breakers: Quantum-Safe Crypto for the Real World

Bracing for Breakers: Quantum-Safe Crypto for the Real World

Comments
2 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
Quantum Dawn: Hardening Our Networks Before the Storm

Quantum Dawn: Hardening Our Networks Before the Storm

Comments
2 min read
Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

7
Comments
3 min read
Enigma Machine : How a step on its rotor change the mapping

Enigma Machine : How a step on its rotor change the mapping

Comments
2 min read
How RSA Works (for Dummies)

How RSA Works (for Dummies)

Comments 2
4 min read
A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

3
Comments 1
3 min read
Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

1
Comments
2 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

Comments
2 min read
Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
Merkle Trees in SQLite with Python: A Practical Tutorial

Merkle Trees in SQLite with Python: A Practical Tutorial

1
Comments
6 min read
loading...