Frequency Analysis Attack – Breaking the Substitution Cipher

The Substitution Cipher Perhaps the oldest and one of the simplest method of encrypting a message is to use the substitution cipher. What this cipher does is, as its name suggests, to simply substitute each character in the message with the character it is mapped to. In this article, we will examine substitution ciphers specifically…

Monitoring Home Web Traffic With A Local DNS Proxy

What happens when you key in some domain name, say “banana.com”, into your laptop’s web browser and hit the enter button? Does your web browser automatically and magically connect to this domain, “banana.com”? How exactly does your web browser know where “banana.com” is even located at? To answer all these questions, we must first understand…