Hello world! Welcome to my personal Cyberblog. I like to write about subjects within the field of hardware security, artificial intelligence and cryptography, were smaller topics are discussed with infographics. Next to that, I also like to write about my personal hardware hobby projects. Happy reading!
Drawing credits: @towel__art

Recent Posts

AES: the Substitution Box

1 minute read

One particular part of the AES operation is interesting for a hardware attack. This is the SubBytes operation, where each byte will be substituted with anoth...

AES: the Inner Workings

1 minute read

In this post, we are going to zoom in on the inner workings of one AES block. AES operates in rounds, which are usually 10, 12 or 14 rounds (matching with AE...

Introduction to AES: a Block Cipher

1 minute read

AES (Advanced Encryption Standard) is the NIST-standard for encrypting data and is widely used. AES is a block cipher, which means that the data is encrypted...

Hardware: Side Channels

1 minute read

Side channels are channels on which information is leaked through the physical properties of the device. These side channels can occur in a more technical se...

Hardware: The CPU

1 minute read

The CPU is the computational unit of a computer. It executes a sequence of instructions, which is provided directly or indirectly by the programmer. Instruct...