© 2023 Hashnode
#cryptography
Image steganography is a technique for concealing secret information within digital images without altering their visual appearance. The concept behind image steganography is to use the redundancy of …
There are many different definitions of Cryptography but if we break down the core idea behind it it's that of deriving procedures to protect protocols against malicious actors. Protocols in that context mean a set of steps that need to be …
Cryptography is the technique of securing information and communications through the use of codes so that only those persons for whom the information is intended can understand and process it. In Cryp…
Hello, I am here to write my first blog and this is going to be on Cryptography which is important to understand while learning Blockchain Development. Cryptography is used to secure transactions taki…
Zero-knowledge proofs (ZKP) are a fascinating and increasingly important concept in the fields of cryptography and computer science. At their core, ZKPs allow one party to prove to another party that …
The Overline Network is an innovative blockchain platform that is focused on creating a decentralized metaverse. One of the key components of the Overline Network is the oRouter, which is a unique net…
An Overview of Blockchain Blockchain is a network of digital immutable ledgers that allows for reliable and transparent transactions between users. This ledger is built on a decentralized database tha…
Introduction Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing pro…
Go introduced a new library called Elliptic Curve Diffie Hellman(crypto/ecdh) in v1.20. Let's see how to use this library to exchange encrypted data between two entities without sharing the secret that was used to encrypt the data. Generate…
Introduction Cryptography has always been seen as a complex and intricate concept. While this is true in terms of the actual algorithms entailed, in most modern languages, C# inclusive we have a conve…