MProblog.mm29942.com·Apr 16, 2024CryptGuard Syntax Overhaul & UpdatesCryptGuard - Post Quantum Cryptographic Crate Overview CryptGuard is a versatile cryptographic crate that provides encryption capabilities using AES or XChaCha20, along with Kyber key encapsulation. It supports key sizes of 512, 768, and 1024 bits an...Discuss·1 likeCryptGuard Programming Library newsfalcon1024
Shikhor Kumer Royshikhorroy.hashnode.dev·Apr 14, 2024HTTPS [EP 02] — How to Generate a Certificate?We already know that a certificate that contains a public key (PUB-K1) is sent in STEP 2 from the LinkedIn server to the client. Today we will open the Blackbox that how this certificate is generated for the LinkedIn server. How a Certificate is Sign...DiscussAPI Basicshttps
Shikhor Kumer Royshikhorroy.hashnode.dev·Apr 14, 2024HTTPS [EP 01] — How It Works?Have you ever wondered, what it means by Connection is secure — shown on your browser? Fig: Proof of: LinkedIn uses HTTPS 😋 Ummm…you may think by yourself, Yes I know it! It is HTTPS, a secure hypertext transfer protocol that is being used here! Bu...DiscussAPI Basicshttps
Sai Keerthan Kasulakeerthankasula.hashnode.dev·Apr 13, 2024Part 2 : Cryptography - The Hybrid EncryptionLet's dive into this article to see how we can put cryptography into action. We'll look at encryption, decryption, signing, verification, and other operations to get a clearer picture. If you haven't checked out my article on introduction to cryptogr...DiscussCryptography
kasinadhsarmablogs.kasinadhsarma.in·Apr 13, 2024A Comprehensive Introduction to Cybersecurity FundamentalsCybersecurity Primer: Cybersecurity is the proactive safeguarding of computer systems, networks, software, and data from unauthorized access, manipulation, or destruction. It encompasses a broad spectrum of tools, methodologies, and best practices a...Discusshashfunctions
Sai Keerthan Kasulakeerthankasula.hashnode.dev·Apr 11, 2024Part 1 : Cryptography and it's types, Explained!Have you ever wondered how data is securely transferred from one entity to another and what developers actually do to ensure that the transmitted data is secure? How cryptography is involved in dealing with application or information security? Well, ...Discusssecure communication
Panagiotis Vasilikossecuringbits.com·Apr 10, 2024Hash Collision AttacksThe SHA-2 family of hash functions lies at the core of securing the internet today. A recent paper by Yingxin Li, Fukang Liu, and Gaoli Wang presents new records in collision attacks for SHA-2. For the brave, the paper can be found at: https://eprint...DiscussCryptography
Brilian Firdausbrilianfird.hashnode.dev·Apr 10, 2024Introduction to JWT (Also JWS, JWE, JWA, JWK)The security and privacy of users' data have been a growing concern for the past few years. At the same time, JWT, as one technology to combat it, has been used more and more. Understanding JWT will give you an edge over the other software engineers....DiscussCryptography
Çağla Çelikcaglos.hashnode.dev·Apr 8, 2024Mathematical Cryptography IITheory of Groups Overview A group is a set G combined with a binary operation * that satisfies the following four properties: Identity Law There is an e ∈ G such that e * a = a * e = a for every a ∈ G. Inverse Law For every a ∈ G there is a (uniq...DiscussCryptography
Arya M. Pathakarya2004.hashnode.dev·Apr 3, 2024Securing the Web: Understanding SSL/TLS, Cryptography, and Different Certificate TypesThe internet has become the lifeblood of our modern world, woven into the fabric of our daily activities. From online banking that keeps our finances afloat to social media that connects us across continents, it transmits a constant stream of sensiti...Discuss·20 likes·39 readsSSL