Related Posts
Encryption Is Foundational to The Future (Part 4 The Reign of the Electro-Mechanical Cyphers)
After the Word War II and during the Cold War, the security in sensitive communications was ruled by Electro-Mechanical Cyphers. Until the 1950’s the WWII the ECM Mark II was […]
Encryption Is Foundational to The Future (Part 3 The Begin of the Technological Age)
The first world war showed the importance of cryptography on the battlefield, and the danger of weak encryption. The second world war became a defining moment in the history of […]
Encryption Is Foundational to The Future (Part 2 The Century of Huge Advances)
The 20th century was marked by huge advances in all the humanity areas, and the cryptography not was the exception. At the begin of the 20th century, cryptography was a […]
Credit Card numbers or IMEI in Java (Luhn Algorithm)
In order to validate large numbers like credit card and International Mobile System Equipment Identity (IMEI) in every smartphone or tablet over the planet is used the Luhn Algorithm; in […]