<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cryptography on Jesus Oseguera</title><link>https://r0tbyt3.dev/tags/cryptography/</link><description>Recent content in Cryptography on Jesus Oseguera</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://r0tbyt3.dev/tags/cryptography/index.xml" rel="self" type="application/rss+xml"/><item><title>Argon2</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/argon2/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/argon2/</guid><description>Argon2 Argon2 - memory-hard password hashing algorithm designed to resist GPU and brute-force attacks.
Related Links: Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Bcrypt</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/bcrypt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/bcrypt/</guid><description>Bcrypt Bcrypt - adaptive password hashing function designed to be computationally expensive to resist cracking.
Related Links: Argon2 Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Cryptographic Algorithms</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/cryptographic-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/cryptographic-algorithms/</guid><description>Cryptographic Algorithms Cryptographic Algorithms - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptography Fundamentals Data Anonymization Techniques Data Masking Techniques Secure Communication Techniques Steganography</description></item><item><title>Cryptography</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/</guid><description>Cryptography Cryptography - cryptographic primitives and protocols used to protect data integrity, confidentiality, and authenticity.
Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS Related Links: Authentication Authorization Web Security</description></item><item><title>Cryptography</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/</guid><description>Cryptography Cryptography - the study of techniques for secure communication and data protection using mathematical algorithms and protocols.
Cryptographic Algorithms Cryptography Fundamentals Data Anonymization Techniques Data Masking Techniques Secure Communication Techniques Steganography Related Links: Application Security Bash Burp Suite Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Cryptography Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/cryptography-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/cryptography-fundamentals/</guid><description>Cryptography Fundamentals Cryptography Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Data Anonymization Techniques Data Masking Techniques Secure Communication Techniques Steganography</description></item><item><title>Data Anonymization Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/data-anonymization-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/data-anonymization-techniques/</guid><description>Data Anonymization Techniques Data Anonymization Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Cryptography Fundamentals Data Masking Techniques Secure Communication Techniques Steganography</description></item><item><title>Data Masking Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/data-masking-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/data-masking-techniques/</guid><description>Data Masking Techniques Data Masking Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Cryptography Fundamentals Data Anonymization Techniques Secure Communication Techniques Steganography</description></item><item><title>Hashing algorithms</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/hashing-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/hashing-algorithms/</guid><description>Hashing algorithms Hashing Algorithms - functions mapping data of arbitrary size to fixed-size values for integrity and security.
Related Links: Argon2 Bcrypt MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>MD5</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/md5/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/md5/</guid><description>MD5 MD5 - cryptographic hash function producing a 128-bit digest, now considered insecure for security use.
Related Links: Argon2 Bcrypt Hashing algorithms Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Scrypt</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/scrypt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/scrypt/</guid><description>Scrypt Scrypt - password hashing function designed to be memory-intensive to resist hardware-based attacks.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 SHA-1 SHA-256 TLS</description></item><item><title>Secure Communication Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/secure-communication-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/secure-communication-techniques/</guid><description>Secure Communication Techniques Secure Communication Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Cryptography Fundamentals Data Anonymization Techniques Data Masking Techniques Steganography</description></item><item><title>SHA-1</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-1/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-1/</guid><description>SHA-1 SHA-1 - cryptographic hash function producing a 160-bit digest, deprecated due to collision vulnerabilities.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-256 TLS</description></item><item><title>SHA-256</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-256/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-256/</guid><description>SHA-256 SHA-256 - secure hash algorithm producing a 256-bit digest, widely used for data integrity and signatures.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 TLS</description></item><item><title>Steganography</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/steganography/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/cryptography/steganography/</guid><description>Steganography Steganography - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Cryptographic Algorithms Cryptography Fundamentals Data Anonymization Techniques Data Masking Techniques Secure Communication Techniques</description></item><item><title>TLS</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/tls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/tls/</guid><description>TLS TLS - cryptographic protocol providing secure communication over a network through encryption and certificates.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256</description></item></channel></rss>