Joshua Berkoh

PhD Candidate in information technology with a passion for Applied Cryptography, Privacy preserving Technologies, and Detection Engineering.

Blog

Welcome to my blog where I share insights on cryptography, cybersecurity, and my journey through PhD research.

All Posts

Week 4 - Modern Encryption Primitives Beyond the Basics

Building on probability and secrecy, this week I explore advanced cryptographic primitives: Format-Preserving Encryption, Fully Homomorphic Encryption, Searchable Encryption, and Tweakable Encryption. I also examine how weak ciphers and wrong models undermine security.

Read more →

Week 2 - The Birth of Modern Security

My second week's dive into cryptography, exploring the transition from classical ciphers to modern security. This post unpacks Kerckhoffs's Principle, attack models, and why mathematical rigor is essential.

Read more →

Categories

Cryptography

Study Notes

Reflections