Mohammd Reza Geramiariyagerami.hashnode.dev·Jul 25, 2024Authentication methods for Internet of Things (IoT) devicesExploring the most effective authentication methods for Internet of Things (IoT) devices is an ongoing journey filled with research and debate. Here are some popular and efficient methods worth considering: 1. Lightweight Authentication Protocols: ...Discuss·1 likeIoT security
Gaurav Vishwakarmablogs.gauravvishwakarma.com·Jul 21, 2024Unveiling the Mysteries: Public Key, Private Key, and Address in the Ethereum RealmThe world of Ethereum and blockchain technology is both fascinating and complex, filled with unique cryptographic components that work in harmony to secure and manage digital assets. Among these components, three fundamental elements stand out: the p...DiscussEthereum
Abhinandan Khuranablog.s3curity.ninja·Jul 21, 2024Trusted Platform Computing 🚀Hello, Tech enthusiasts! Welcome to this blog series where we delve into the fascinating world of Trusted Platform Modules (TPMs). In this series, we will explore what TPMs are, their history, how they work, and their practical applications in enhanc...Discuss·212 readsTrusted Platform Computing 🚀trusted-platform-computing
Ahmad W Khanblog.ahmadwkhan.com·Jul 19, 2024Understanding End-to-End EncryptionIn an era where digital communication has become integral to our daily lives, the need for secure and private messaging has never been more critical. End-to-end encryption (E2EE) stands as a formidable guardian of privacy, ensuring that only the inte...Discuss·1 likeE2E
CryptapeforCryptape Jungleblog.cryptape.com·Jul 19, 2024Satoshi Scoop Weekly, 19 Jul 2024Crypto Insights Bitcoin Testnet 4: Including PoW Difficulty Adjustment and Time Warp Bug Fix In addition to consensus changes, the main differences between Testnet 4 and 3 are reflected in the chain parameters: the deployment heights of past soft fo...DiscussSatoshi Scoop WeeklyBitcoin Layer 2 Solutions
Legos Lightlegos.hashnode.dev·Jul 18, 2024Algorithm for calculating powers of extremely large numbersProblem As we all know the expression: \(x^n \mod m; (\forall x,n,m \in \mathbb N)\) is the building block of most of the cryptographic techniques. A simple implementation of it would be: // calculate x^n function power(x, n, m) { let result ...Discusspowers of extremely large numbers
Senuli wanniarachchisenuli.hashnode.dev·Jul 18, 2024Quantum Computing: Bridging the Gap Between Theory and Practical ApplicationsIn the realm of computing, quantum mechanics represents a frontier that promises revolutionary advancements beyond the capabilities of classical computers. Quantum computing harnesses the principles of quantum mechanics to manipulate information in w...Discuss·9 likesQuantum
Osama Shaikhblog.osshaikh.com·Jul 15, 2024Cross Tenant Authentication for TDE via Workload Federation identityIntroduction: In my recent engagement with a customer operating under a multi-tenant architecture, I encountered a shared service model where a centralized Hub included a Key Management Service (KMS) using a Dedicated Hardware Security Module (HSM). ...Discuss·61 readsAzure
Md. Sadiqmdsadiqmd.hashnode.dev·Jul 14, 2024Cryptography and Digital SignaturesIntroduction On the Internet, we try to send data between two nodes, users, or machines, but there is always an underlying threat of information or data leaks, generally termed as Man-in-the-Middle attack. Thus, cryptography comes into the picture. E...Discuss·1 like·26 readsdigital-signature
Abel Misiochaabelmisiocha.hashnode.dev·Jul 9, 2024Two way encryption in GoLangSometimes you need to store sensitive data that cannot be stored as plain text in your database. When the data stored needs to be used in its original plain text format, we then need a way to decrypt it. Unlike bcrypt, which is one-way, we need a way...Discussencryption