logo
Red wilds
Secret recipes for digital mischief
  • Privacy greenhouse
  • Defence blues
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Unseen University Power & Light Co.
    • The Scarlet Semaphore
    • Myrddin’s menagerie
    • In: Where the falcons and foxes roam
    • Through: Where the raccoons burrow and rummage
      • The art of staying where you are not wanted
      • Overflowing the bin on purpose
      • Reverse engineering
      • Steganography
      • Crypto-attacks
        • Field notes from the bin-raider’s handbook
        • Crypto-attack runbooks
        • Picking the locks of logic
          • Secret recipes for digital mischief
            • AES: A symmetric block cipher
            • LFSR: Linear feedback shift registers
            • RSA: An asymmetric key exchange
          • Secret recipes for digital mischief
            • AES: A symmetric block cipher
            • LFSR: Linear feedback shift registers
            • RSA: An asymmetric key exchange
          • AES: Faults, flips, and forgery
          • Hash function vulnerabilities
          • The curiosity cabinet
      • Slipping through the cracks
    • Out: Where squirrels swipe the crown jewels

    Secret recipes for digital mischief¶

    Modern encryption is not magic, just cleverly disguised algebra. In this section, we code the arcane, one line at a time. Whether it’s spinning up RSA key pairs or poking around LFSRs, this is where we turn black-box mystique into paw-friendly logic.

    Modern ciphers @GitHub

    • AES: A symmetric block cipher
    • LFSR: Linear feedback shift registers
    • RSA: An asymmetric key exchange
    2026-03-25 22:33
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7