28 Jun 11
Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. Both transparent images or layers are required to reveal the information. The easiest way to implement Visual Cryptography is to print the two layers onto a transparent sheet.
14 Jun 11
How to crack Java’s default random number generator, java.util.Random
13 Oct 10
Animation of the AES algorithm.
06 Aug 10
The purpose of this note is to illustrate how the ordinary standards of ran- domness have little to do with the type of randomness required for cryptographic purposes. That is, there are really two standards of randomness.