Prøve GULL - Gratis
SageMath: Deeper Insights into Cybersecurity
Open Source For You
|March 2025
In the previous article in this SageMath series (published in the January 2025 issue of OSFY), we concluded our discussion of classical encryption techniques and moved on to the exploration of modern cryptography by looking at symmetric-key cryptography. In this ninth article in the series, we will continue the focus on symmetric-key cryptography.

In the last article, we wrote a SageMath program to implement a simple symmetric-key cryptographic algorithm called DES using a Python package called ‘PyCryptodome’. As promised, we will discuss the implementation of DES briefly in this article.
Most cryptography textbooks covering DES introduce a simplified version called the Simplified Data Encryption Standard (S-DES) to explain its working. S-DES follows the same fundamental principles as DES but operates on a smaller scale. It is a block cipher that encrypts 8-bit plaintext blocks using a 10-bit key, which is processed to generate two 8-bit subkeys for encryption and decryption. For a detailed analysis of S-DES, I recommend the classic textbook ‘Cryptography and Network Security: Principles and Practice’ by William Stallings. Let’s first explore the concept of block ciphers before examining how DES functions as one.
Block ciphers
A block cipher is an encryption method that processes data in fixed-size blocks, transforming plaintext into ciphertext using a secret key. A block cipher encrypts a block of N bits at a time (for example, DES uses 64-bit blocks). Each block is encrypted independently but may be linked to other blocks depending on the mode in which the block cipher operates.
In addition to DES, other examples of block ciphers include AES (Advanced Encryption Standard), which operates on a 128-bit block of data with key sizes of 128, 192, or 256 bits; Blowfish, which operates on a 64-bit block of data with a variable-length key ranging from 32 to 448 bits; and Twofish, which operates on a 128-bit block of data with key sizes up to 256 bits.
Denne historien er fra March 2025-utgaven av Open Source For You.
Abonner på Magzter GOLD for å få tilgang til tusenvis av kuraterte premiumhistorier og over 9000 magasiner og aviser.
Allerede abonnent? Logg på
FLERE HISTORIER FRA Open Source For You

Open Source For You
A Simple System that Uses Duplicati for Backing Up Data
The open source based data backup system outlined here can be really useful for a small office home office setup. Learn how to set up Duplicati on Windows, back up data to a Linux server, schedule daily backups, secure them with encryption, restore files when needed, and receive email notifications.
9 mins
August 2025
Open Source For You
Lisp for Robotics: Implementing Graph Traversal
Created in 1959 by John McCarthy, Lisp is a programming language designed to manipulate symbolic data easily, which is a key characteristic of AI. This language is still used for prototyping and to demonstrate different AI concepts. Here's a short tutorial on how it can help to implement three graph traversal algorithms.
5 mins
August 2025
Open Source For You
LibreOffice 25.2.5 is stable and reliable after 63 bug fixes
The Document Foundation has officially released LibreOffice 25.2.5, the fifth maintenance update in the LibreOffice 25.2 series.
1 min
August 2025

Open Source For You
The Evolution of PostgreSQL in the Age of AI
PostgreSQL, enhanced with the pgvector extension, brings semantic search capabilities into a traditional SQL environment. With support for both structured queries and Al-driven search, pgvector enables developers to build intelligent, cost-effective applications within a familiar ecosystem, positioning PostgreSQL as a future-ready, Al-native database. Let's learn more....
5 mins
August 2025

Open Source For You
Calico: Open source platform for Kubernetes networking, security, and observability is in version 3.30
Calico is an open source, unified platform that integrates networking, security, and observability for Kubernetes environments—whether deployed in the cloud, on-premises, or at the edge.
1 min
August 2025

Open Source For You
Red Hat launches RHEL for Business Developers
Red Hat has announced Red Hat Enterprise Linux for Business Developers, a new self-service offering aimed at simplifying access to its flagship enterprise Linux platform for development and testing.
1 min
August 2025

Open Source For You
Data Governance in the Digital Era: An Overview
Data governance plays a critical role in ensuring effective data management in an organisation. Businesses who invest in it are at a definite advantage over those who don't.
7 mins
August 2025

Open Source For You
Shape the Success of Your Business with Smart Data Management and Security Practices
In today's world, data is a company's best asset, if used well. Also, data management and data security are no longer merely good business practices - they are critical to the success of an organisation.
6 mins
August 2025
Open Source For You
Wireshark 4.4.8 comes with updated protocol support and key bug fixes
The Wireshark team has announced the release of Wireshark 4.4.8, the eighth maintenance update in the 4.4 stable series of the world's most popular open source network protocol analyser.
1 min
August 2025

Open Source For You
HealSphere: An Open Source-Based Mental Health Support Platform
This real-world CI/CD implementation has been developed using open source tools to deploy a modular mental health support platform.
11 mins
August 2025
Listen
Translate
Change font size