Introduction Thread.Sleep allows user to hold or suspend or block the current thread execution till a predefined time. it is implemented in System.Threading.Thread.dll assembly. It…
The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length encrypted…
Continuous Deployment (CD) is an autonomous release process that uses automated testing to validate changes for instant auto deployment to a production environment. As good…
In early 70’s to send a secret message, both parties (sender and receiver) have to exchange the key to encrypt and decrypt the message. Exchange…
Modular Exponentiation as also known as repeated sequence algorithm which performs exponentiation over modulus. Which essential in computer cryptosystems. A typical problem related to cryptography…
Being human, we always concern about our privacy. Privacy plays a significant role in our lives, right from starting on the day till the end…
RC4 (Rivest Cipher 4) was designed by Ron Rivest. It is remarkable for its speed and simplicity. It widely used in many applications and protocols. Though, there are…
In this article, we will demonstrate eXtended Tiny Encryption Algorithm (XTEA). Don’t forget to read the Part I of TEA. XTEA (eXtended TEA) is a…
Tiny Encryption Algorithm is a simple, powerful & notably fast encryption algorithm. Although TEA algorithm has a few weaknesses as it suffers from equivalent keys (Which…
A deterministic algorithm is an Algorithm in which for a given input, the computer will always produce the same output by going through the same states…