Click here to Skip to main content
65,938 articles
CodeProject is changing. Read more.
Everything / security / cryptography

Cryptography

cryptography

Great Reads

by charles henington
Simple user defined Cipher Transform that I got the idea from https://www.codeproject.com/Articles/5319044/ARC4-Encryption-Library
by Marian Placko
This article shows a simple hack of a built-in MS SQL Server WITH ENCRYPTION mechanism
by Pavel Bashkardin
Management of cryptographic activation keys to protect your application
by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.

Latest Articles

by charles henington
Simple user defined Cipher Transform that I got the idea from https://www.codeproject.com/Articles/5319044/ARC4-Encryption-Library
by Marian Placko
This article shows a simple hack of a built-in MS SQL Server WITH ENCRYPTION mechanism
by Pavel Bashkardin
Management of cryptographic activation keys to protect your application
by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.

All Articles

Sort by Score

cryptography 

by charles henington
Simple user defined Cipher Transform that I got the idea from https://www.codeproject.com/Articles/5319044/ARC4-Encryption-Library
by Marian Placko
This article shows a simple hack of a built-in MS SQL Server WITH ENCRYPTION mechanism
by Daniel Ramnath
C++ (CygWin GCC) and OpenSSL code to Attack upon AES-CTR encryption
by Daniel Ramnath
Breaking Vigenère cipher with C++, believed to be unbreakable for two centuries.
by Daniel Ramnath
Breaking weak RSA with C++ & GMPXX library
by amsainju
This tip shows you how to compile crypto++ for 64-bit environment.
by Deepraj Thuraka
Tweaking of the Bouncy Castle library to make it work with SecP128r1 curve1251
by Daniel Ramnath
C++ OpenSSL 3.1 Attack AES-CBC using Padding Oracle Attack, and Timing Attack
by Dan Mihajlov
How a bad constant can cause a security breach
by Alexander Van Berg
Short case study for a do-it-yourself cryptography system.
by Aravind.V.S
Embed secret messages in image files using Autohotkey.
by Christian Amado
A very brief article about the implementation of encryption and decryption of a string in Silverlight Business Application
by Apprieu (Apprieu)
How to generate a serial key with Crypto API MFC
by Dharmateja Challa
This article is about generating random data using Trusted Platform Module in Windows 10 and testing its randomness using dieharder test suite.
by Daniel Ramnath
C++, Win32 API - Injecting DLL in a process
by ADMGNS
Very simple, noise-based color visual cryptography for images
by Asif Bahrainwala
A simple C++ program to generate RSA key pair
by Kuthuparakkal
Input drives action to perform : Encryption or Decryption - Implementation of user defined encryption signature with standard cryptographic algorithms
by vpnchoudhary
The sha1 hash generation tool can be used to generate hashes on a file. The has generated can be outputted in the form of dig/Hex/Base64. You may use this utility to verify the integrity of the file transported over internet to make sure they are safe from tampering.
by Cryptonite
This code gives a solution to the Chinese Remainder Theorem using totients instead of the Extended Euclidean algorithm.
by Cryptonite
The Blum Micali algorithm provides for a cryptographically secure PRNG (pseudo random number generator).