Legos Lightlegos.hashnode.dev·Nov 20, 2024Merkle Tree💡 Merkle Tree, hay còn gọi là Cây Merkle, là một cấu trúc dữ liệu quan trọng trong lĩnh vực mật mã học và khoa học máy tính, được phát minh bởi nhà mật mã học Ralph Merkle vào năm 1979. Merkle Tree đóng vai trò thiết yếu trong nhiều hệ thống lưu trữ...DiscussCryptography & Blockchainmerkle tree
Nysa Guptanysaa.hashnode.dev·Nov 1, 2024Cryptography: The Secret Code Behind Your ScreensEver wonder how your data stays private when you’re shopping online, sending a message, or logging into a bank account? Cryptography is the art (and science) that makes sure all that sensitive information remains hidden from prying eyes. Imagine it l...Discuss·1 likecybersecurity
Legos Lightlegos.hashnode.dev·Oct 31, 2024Bloom FilterGiới thiệu Bloom Filter là một cấu trúc dữ liệu có tính chất xác suất dùng để kiểm tra một phần tử có nằm trong một tập hợp hay không. Nó rất hiệu quả về mặt không gian lưu trữ và tốc độ. Bloom filter có thể trả lời hai câu hỏi chính: Phần tử có thể...DiscussCryptography & Blockchainbloom filter
J3bitokjebitok.hashnode.dev·Oct 28, 2024Cryptography: John the Ripper: The Basics (TryHackMe)In this article, I will write a write-up for John the Ripper: The Basics that the Basic Terms, Setting Up John on Your System, Cracking Basic Hashes, Cracking Windows Authentication Hashes, Cracking /etc/shadow Hashes, Single Crack Mode, Custom Rules...Discussrainbow-table
Utkarsh Kumarutkarsh89.hashnode.dev·Oct 28, 2024Encryption Evolution: From Classical Ciphers to Quantum SecurityIn today’s interconnected world, securing digital information is paramount. Encryption, the cornerstone of data protection, has evolved dramatically from its rudimentary beginnings to the sophisticated algorithms safeguarding our modern communication...Discuss·4 likesencryption
J3bitokjebitok.hashnode.dev·Oct 27, 2024Public Key Cryptography BasicsIn this article, I will write a write-up for Public Key Cryptography Basics that covers the Common Use of Asymmetric Encryption, RSA, Diffie-Hellman Key Exchange, SSH, Digital Signatures and Certificates, as well as PGP and GPG to understand how publ...DiscussCryptography
Sai Keerthan Kasulakeerthankasula.hashnode.dev·Oct 27, 2024The Client-Server Communication - SSL/TLS Handshake ProcessPrologue In this article, we’ll explore the communication process between the client (browser) and server, focusing on how they exchange data and validate each other to ensure that only the intended parties are involved and that the data remains secu...DiscussSSL/TLS
J3bitokjebitok.hashnode.dev·Oct 27, 2024Cryptography: Cryptography Basics (TryHackMe)In this article, I will write a write-up for Cryptography Basics that covers the Importance of Cryptography, Plaintext to Ciphertext, Historical Ciphers, Types of Encryption and Basic Math in cryptography and symmetric encryption. What is the standa...DiscussCryptography
JKARjonans-blog.hashnode.dev·Oct 22, 2024Understanding Cryptography: The Backbone of Modern Encryption and DecryptionIn today’s digital world, where data breaches and cyber threats are ever-evolving, cryptography plays a crucial role in protecting sensitive information. Whether you're securing your online banking, ensuring the privacy of your emails, or safeguardin...Discuss·2 likes#cybersecurity
Clara Sternercryptoreview.hashnode.dev·Oct 22, 2024Clustr.io vs. Core: Choosing the Best Crypto Platform for Your PortfolioAs the cryptocurrency world grows, so does the number of platforms available to help you manage your investments. Each platform offers unique features designed to meet the needs of different types of users. In this comparison, we’ll take a close look...DiscussCryptocurrency