← Back to Gallery

Modern Cryptography

Explore contemporary encryption algorithms, protocols, and security concepts through interactive visualizations

01

DES Block Cipher

Visualize the 16-round Feistel network structure of the Data Encryption Standard

02

AES Step Visualization

Watch SubBytes, ShiftRows, MixColumns, and AddRoundKey transform the state

03

RSA Key Generation

Interactive public-key cryptography with prime factorization

04

Diffie-Hellman Key Exchange

Establish shared secrets over insecure channels with discrete logarithms

05

Elliptic Curve Cryptography

Point addition on curves - the math behind Bitcoin and TLS

06

SHA-256 Hash Visualization

Watch the avalanche effect and explore collision resistance

07

Digital Signatures

Sign and verify messages with asymmetric cryptography

08

SSL/TLS Handshake

Step through HTTPS connection establishment with TLS 1.3

09

Block Cipher Modes

Compare ECB, CBC, and CTR with the famous ECB penguin demo

10

Zero-Knowledge Proofs

Ali Baba's Cave - prove knowledge without revealing secrets

11

HMAC Authentication

Message authentication codes for integrity and authenticity

12

Key Derivation Functions

PBKDF2, bcrypt, and Argon2 for secure password hashing

13

Symmetric vs Asymmetric

Compare the two fundamental approaches to encryption

14

Quantum Key Distribution

BB84 protocol - provably secure key exchange using quantum mechanics

15

Blockchain Hashing

Proof of work mining and chain integrity visualization

16

PKI & Certificates

Certificate chains, trust hierarchies, and X.509 structure

17

Post-Quantum Cryptography

Lattice-based algorithms preparing for the quantum computing era

18

Homomorphic Encryption

Compute on encrypted data without decrypting - cloud privacy

19

Padding Oracle Attack

How error messages can leak plaintext in CBC mode

20

MD5 Collision Demo

Why MD5 is broken - visualizing hash function vulnerabilities

20
Interactive Demos
256
Bits of Security
2024
NIST Standards