Poging GOUD - Vrij

SageMath: Deeper Insights into Cybersecurity

Open Source For You

|

March 2025

In the previous article in this SageMath series (published in the January 2025 issue of OSFY), we concluded our discussion of classical encryption techniques and moved on to the exploration of modern cryptography by looking at symmetric-key cryptography. In this ninth article in the series, we will continue the focus on symmetric-key cryptography.

- Dr Deepu Benson

SageMath: Deeper Insights into Cybersecurity

In the last article, we wrote a SageMath program to implement a simple symmetric-key cryptographic algorithm called DES using a Python package called ‘PyCryptodome’. As promised, we will discuss the implementation of DES briefly in this article.

Most cryptography textbooks covering DES introduce a simplified version called the Simplified Data Encryption Standard (S-DES) to explain its working. S-DES follows the same fundamental principles as DES but operates on a smaller scale. It is a block cipher that encrypts 8-bit plaintext blocks using a 10-bit key, which is processed to generate two 8-bit subkeys for encryption and decryption. For a detailed analysis of S-DES, I recommend the classic textbook ‘Cryptography and Network Security: Principles and Practice’ by William Stallings. Let’s first explore the concept of block ciphers before examining how DES functions as one.

Block ciphers

A block cipher is an encryption method that processes data in fixed-size blocks, transforming plaintext into ciphertext using a secret key. A block cipher encrypts a block of N bits at a time (for example, DES uses 64-bit blocks). Each block is encrypted independently but may be linked to other blocks depending on the mode in which the block cipher operates.

In addition to DES, other examples of block ciphers include AES (Advanced Encryption Standard), which operates on a 128-bit block of data with key sizes of 128, 192, or 256 bits; Blowfish, which operates on a 64-bit block of data with a variable-length key ranging from 32 to 448 bits; and Twofish, which operates on a 128-bit block of data with key sizes up to 256 bits.

MEER VERHALEN VAN Open Source For You

Open Source For You

Open Source For You

Top 10 Open Source Tools for System and IT Administrators

All reputed online services have committed system and IT administrators working behind the scenes. Here are ten open source tools they should be aware of, as these can help them monitor, automate, as well as manage complex infrastructure with relative ease.

time to read

6 mins

February 2026

Open Source For You

Google opens access to its Gemini Deep Research Agent

Google has opened access to its Gemini Deep Research Agent for the first time, allowing developers to integrate advanced autonomous research capabilities directly into their applications.

time to read

1 min

February 2026

Open Source For You

Open Source For You

NVIDIA buys SchedMD, keeps Slurm open source and vendor neutral

NVIDIA has acquired AI software company SchedMD, signalling a deeper commitment to open source technologies as competition intensifies across the artificial intelligence ecosystem.

time to read

1 min

February 2026

Open Source For You

Open Source For You

How Open Source Tools Power Modern IT Operations

Open source tools have not replaced enterprise IT platforms; they have become the connective layer that makes modern operations possible.

time to read

6 mins

February 2026

Open Source For You

Mandiant's Auralnspector enhances Salesforce security

Google-owned cybersecurity firm Mandiant has released AuraInspector, a free, open source command-line tool designed to identify dangerous access control misconfigurations in Salesforce environments, marking a significant move to democratise enterprise-grade security testing.

time to read

1 min

February 2026

Open Source For You

Google launches Universal Commerce Protocol to power agentic AI commerce

Google has introduced the Universal Commerce Protocol (UCP), a new open standard that enables AI agents to autonomously perform end-to-end commerce activities, spanning product discovery, purchasing, checkout, payments, and postpurchase experiences.

time to read

1 min

February 2026

Open Source For You

Open Source For You

Zero Trust CI/CD: The Death of Static Secrets

In an era where data breach costs continue to hit record highs, shifting to a secretless CI/CD pipeline is the most effective step to safeguard digital infrastructure.

time to read

7 mins

February 2026

Open Source For You

Open Source For You

Quantum Algorithms: The Future of Computing

Explore the essence of quantum algorithms, their groundbreaking applications, recent innovations, and the challenges that remain.

time to read

8 mins

February 2026

Open Source For You

Open Source For You

Bringing Clarity to the Chaos in AI

AI feels powerful, yet most teams struggle because they cannot define what intelligence they really need. But there are ways to address this challenge.

time to read

5 mins

February 2026

Open Source For You

Open Source For You

Top researchers return to OpenAI

OpenAI has welcomed back three high-profile researchers, Barret Zoph, Luke Metz, and Sam Schoenholz, following their brief tenure at former OpenAI CTO Mira Murati's AI startup, Thinking Machines.

time to read

1 min

February 2026

Listen

Translate

Share

-
+

Change font size