Modern Cryptography
Explore contemporary encryption algorithms, protocols, and security concepts through interactive visualizations
DES Block Cipher
Visualize the 16-round Feistel network structure of the Data Encryption Standard
02AES Step Visualization
Watch SubBytes, ShiftRows, MixColumns, and AddRoundKey transform the state
03RSA Key Generation
Interactive public-key cryptography with prime factorization
04Diffie-Hellman Key Exchange
Establish shared secrets over insecure channels with discrete logarithms
05Elliptic Curve Cryptography
Point addition on curves - the math behind Bitcoin and TLS
06SHA-256 Hash Visualization
Watch the avalanche effect and explore collision resistance
07Digital Signatures
Sign and verify messages with asymmetric cryptography
08SSL/TLS Handshake
Step through HTTPS connection establishment with TLS 1.3
09Block Cipher Modes
Compare ECB, CBC, and CTR with the famous ECB penguin demo
10Zero-Knowledge Proofs
Ali Baba's Cave - prove knowledge without revealing secrets
11HMAC Authentication
Message authentication codes for integrity and authenticity
12Key Derivation Functions
PBKDF2, bcrypt, and Argon2 for secure password hashing
13Symmetric vs Asymmetric
Compare the two fundamental approaches to encryption
14Quantum Key Distribution
BB84 protocol - provably secure key exchange using quantum mechanics
15Blockchain Hashing
Proof of work mining and chain integrity visualization
16PKI & Certificates
Certificate chains, trust hierarchies, and X.509 structure
17Post-Quantum Cryptography
Lattice-based algorithms preparing for the quantum computing era
18Homomorphic Encryption
Compute on encrypted data without decrypting - cloud privacy
19Padding Oracle Attack
How error messages can leak plaintext in CBC mode
20MD5 Collision Demo
Why MD5 is broken - visualizing hash function vulnerabilities