DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy

How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy

Comments
8 min read
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Comments
4 min read
Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Comments
10 min read
Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

4
Comments
9 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
Quantum Dawn: Hardening Our Networks Before the Storm

Quantum Dawn: Hardening Our Networks Before the Storm

Comments
2 min read
Bracing for Breakers: Quantum-Safe Crypto for the Real World

Bracing for Breakers: Quantum-Safe Crypto for the Real World

Comments
2 min read
Secure Remote Password (SRP) protocol

Secure Remote Password (SRP) protocol

5
Comments
14 min read
Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

2
Comments
3 min read
Cryptography for developers

Cryptography for developers

2
Comments
3 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
Merkle Trees in SQLite with Python: A Practical Tutorial

Merkle Trees in SQLite with Python: A Practical Tutorial

Comments
6 min read
Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

6
Comments
3 min read
Enigma Machine : How a step on its rotor change the mapping

Enigma Machine : How a step on its rotor change the mapping

Comments
2 min read
How RSA Works (for Dummies)

How RSA Works (for Dummies)

Comments 2
4 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

Comments
2 min read
A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

3
Comments 1
3 min read
Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

1
Comments
2 min read
Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
How Does Public Key Cryptography Work?

How Does Public Key Cryptography Work?

Comments
3 min read
How to decrypt broken GCM ciphertext

How to decrypt broken GCM ciphertext

1
Comments
4 min read
🔐 What if the key to a secret was held by many, not one?

🔐 What if the key to a secret was held by many, not one?

Comments
1 min read
loading...