We redirect you to /r/breakmycode or /r/codes. If anyone sends you a code or a cipher without telling you how they encrypted it, don't bother posting it on this subreddit - your post will get deleted. We won't solve your ciphers unless you provide us with an algorithm. It is however allowed to help you understand material and or the questions. The creator of the sub also approve of the Udacity course Applied Cryptography - A Science of Secrets.Ī combined karma of at least 10 is required to post or comment in this sub.Ĭryptocurrency talk is only allowed if it's to discuss the cryptography subparts of it. If you want a formal introduction to cryptography, you should read An Introduction to Mathematical Cryptography. They also use a lot of time looking for security holes in existing protocols to make sure they can still be trusted. From Greek κρύπτω krýpto "hidden" and the verb γράφω gráfo "to write" or λέγειν legein "to speak".Ĭryptography is the practice of establishing a secure connection between two parties in the presence of a third party whom you don't want to be able to read your messages.Ĭryptographers design algorithms and protocols, which do exactly this (and many other things).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |