Facebook Pixel {العنوان: سلسلة} | {اسم المغناطيس: سلسلة} - {الفئة: سلسلة} - اقرأ هذه القصة على Magzter.com
استمتع بـUnlimited مع Magzter GOLD

استمتع بـUnlimited مع Magzter GOLD

احصل على وصول غير محدود إلى أكثر من 9000 مجلة وصحيفة وقصة مميزة مقابل

$149.99
 
$74.99/سنة

يحاول ذهب - حر

SageMath: Deeper Insights into Cybersecurity

March 2025

|

Open Source For You

In the previous article in this SageMath series (published in the January 2025 issue of OSFY), we concluded our discussion of classical encryption techniques and moved on to the exploration of modern cryptography by looking at symmetric-key cryptography. In this ninth article in the series, we will continue the focus on symmetric-key cryptography.

- Dr Deepu Benson

SageMath: Deeper Insights into Cybersecurity

In the last article, we wrote a SageMath program to implement a simple symmetric-key cryptographic algorithm called DES using a Python package called ‘PyCryptodome’. As promised, we will discuss the implementation of DES briefly in this article.

Most cryptography textbooks covering DES introduce a simplified version called the Simplified Data Encryption Standard (S-DES) to explain its working. S-DES follows the same fundamental principles as DES but operates on a smaller scale. It is a block cipher that encrypts 8-bit plaintext blocks using a 10-bit key, which is processed to generate two 8-bit subkeys for encryption and decryption. For a detailed analysis of S-DES, I recommend the classic textbook ‘Cryptography and Network Security: Principles and Practice’ by William Stallings. Let’s first explore the concept of block ciphers before examining how DES functions as one.

Block ciphers

A block cipher is an encryption method that processes data in fixed-size blocks, transforming plaintext into ciphertext using a secret key. A block cipher encrypts a block of N bits at a time (for example, DES uses 64-bit blocks). Each block is encrypted independently but may be linked to other blocks depending on the mode in which the block cipher operates.

In addition to DES, other examples of block ciphers include AES (Advanced Encryption Standard), which operates on a 128-bit block of data with key sizes of 128, 192, or 256 bits; Blowfish, which operates on a 64-bit block of data with a variable-length key ranging from 32 to 448 bits; and Twofish, which operates on a 128-bit block of data with key sizes up to 256 bits.

المزيد من القصص من Open Source For You

Open Source For You

Open Source For You

Sending IoT Sensor Data to Public or Private Servers

This IoT system shows a simple and effective way to send sensor data using an ESP8266 microchip.

time to read

3 mins

March 2026

Open Source For You

Open Source For You

Popular FOSS Tools for LLM Observability, Monitoring and Evaluation

This overview of popular tools for monitoring large language models also sheds light on how LLM-as-a-judge enhances their performance.

time to read

2 mins

March 2026

Open Source For You

Open Source For You

Data Deduplication Done the Right Way

Deduplication helps to save space on Linux-based storage systems. Choose the right platform and check whether it meets your goals.

time to read

6 mins

March 2026

Open Source For You

Open Source For You

The Relevance of Rubber Duck Debugging in the Age of AI

Discover why rubber duck debugging is a powerful process today. There's also a step-by-step guide on how to use it in the age of artificial intelligence.

time to read

4 mins

March 2026

Open Source For You

Open Source For You

GitHub weighs turning off pull requests as AĬ slop floods projects

GitHub has formally acknowledged that AI-generated 'slop' is overwhelming open source projects, forcing maintainers to sift through poor pull requests (PRS), abandoned submissions and guideline violations - and is now considering restricting or even disabling pull requests, the core mechanism of open collaboration.

time to read

1 min

March 2026

Open Source For You

Open Source For You

Global banks are deploying Ethereum's Layer-2 stack

Banks are standardising on Ethereum's open source stack as production financial infrastructure, shifting from experimental pilots and proprietary blockchains to live Layer-2 networks for tokenised deposits, interbank payments, and cross-border settlement.

time to read

1 min

March 2026

Open Source For You

Open Source For You

OpenClaw's creator joins OpenAl

In a move that reinforces its commitment to open development rather than acquisition, OpenAI has brought Peter Steinberger, founder of OpenClaw, into the company while placing the popular AI agent under a foundation structure to ensure it remains open source.

time to read

1 min

March 2026

Open Source For You

LibreOffice 26.2 comes with native Markdown support

LibreOffice 26.2 has been released by The Document Foundation, strengthening its position as a fully free and open source office suite for Windows, macOS, and Linux, with support for more than 120 languages.

time to read

1 min

March 2026

Open Source For You

Open Source For You

Indian government mandates labelling of Al-generated content and quicker deletion of illegal deepfakes

India has introduced sweeping AI content rules that immediately place pressure on social platforms and open source AI ecosystems to label, trace and rapidly remove AI Open ource synthetic media at scale.

time to read

1 min

March 2026

Open Source For You

Open Source For You

I2C and I3C: How Modern Devices Communicate

I3C and I2C are both two-wire communication protocols that help exchange data between multiple devices. While I3C preserves the simplicity of I2C, it introduces new features suited for today's sensor-rich devices.

time to read

8 mins

March 2026

Listen

Translate

Share

-
+

Change font size