Hash functions are one-way functions, meaning they take some input data and generate a fixed-size output that resembles encrypted data but cannot be reversed to […]
Mês: janeiro 2025
Understanding FCS in 802.11: CRC-32 Explained
FCS (Frame Check Sequence) is the name of the 802.11 MAC address frame field, which is calculated over both the 802.11 header and frame body. […]
Understanding the Galois/Counter Mode (GCM) Encryption in WPA-3
WPA3 uses advanced encryption techniques to protect data confidentiality and integrity in wireless networks. The encryption method it uses is Galois/Counter Mode (GCM), which enhances […]
CCM Authenticated Encryption: A Detailed Walkthrough
In my last post, I talked about encryption modes, covering the outdated and not-so-great ECB, along with CBC and CTR. Now let’s dive into CCM […]
Understanding AES Encryption Modes: From ECB to CBC and CTR
In previous posts, we discussed how AES encryption works, breaking down the process of encrypting a 128-bit (16-byte) plaintext into a ciphertext of the same […]