Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    text
    copied!<p>The correct answer is to not do something like this. The best method is to pick one of the many cryptography libraries out there for this purpose and use them in your application. Security through obscurity never works.</p> <p>Pick the current top standards for cryptography algorithms as well. AES for encryption, SHA256 for hashing. Elgamal for public key.</p> <p>Reading Applied Cryptography is a good idea as well. But a vast majority of the book is details of implementations that you won't need for most applications.</p> <p>Edit: To expand upon the new information given in the edit. The vast majority of current cryptography involves lots of complicated mathematics. Even the block ciphers which just seem like all sorts of munging around of bits are the same.</p> <p>In this case then read Applied Cryptography and then get the book <a href="http://www.cacr.math.uwaterloo.ca/hac/" rel="noreferrer">Handbook of Applied Cryptography</a> which you can download for free.</p> <p>Both of these have lots of information on what goes into a cryptography algorithm. Some explanation of things like differential and linear cryptanalysis. Another resource is <a href="http://citeseer.ist.psu.edu/" rel="noreferrer">Citeseer</a> which has a number of the academic papers referenced by both of those books for download.</p> <p>Cryptography is a difficult field with a huge academic history to it for going anywhere. But if you have the skills it is quite rewarding as I have found it to be.</p>
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload