Turkijanturkijan.hashnode.dev·11 hours agoCrytography ___ Revolution In SecurityMy expertise in cryptography includes a solid foundation in the fundamental principles of symmetric and asymmetric key cryptography, cryptographic hash functions, message authentication codes, and pseudo-random number generation. I have experience in...DiscussCryptocurrency
Çağla Çelikcaglos.hashnode.dev·18 hours agoMathematical Cryptography ISimple substitution ciphers Simple substitution ciphers are a foundational cryptographic method where each letter in the plaintext is replaced by a letter from a shuffled alphabet. This method is straightforward yet introduces the basic concept of en...DiscussCryptography
Andreas RenzforEncryptoriumblog.encryptorium.com·Mar 27, 2024Public Key Infrastructure (PKI): An essential part of today's internetIn an era where digital security is more critical than ever, understanding the mechanisms that keep our online interactions secure is vital. One of the cornerstone technologies ensuring the confidentiality, integrity, and authentication (CIA) of digi...Discusspublic key infrastructure
SANKALP HARITASHsankalp-haritash.hashnode.dev·Mar 25, 2024Securing the Digital Realm: A Dive into Encryption Algorithms and the Magic of SSL/TLSIn the vast expanse of the digital universe, data security emerges as a paramount concern, akin to safeguarding treasures in the ancient world. Encryption, the art of encoding messages, stands as the guardian of this realm, ensuring that prying eyes ...Discussencryption
Elijah Browndevsdaddy.hashnode.dev·Mar 21, 2024Open-Source Crypto-LibraryUnity Crypto Library is a set of free and open source cross-platform tools for using cryptographic and hash functions in your games. It also contains helper classes for handling files or fast-crypto requests for your convenience. No need examples? Do...Discuss·11 likesOpen-Source Projectsunity
Emin MuhammadiforArticles by Emin Muhammadiarticles.eminmuhammadi.com·Mar 18, 2024Diffie–Hellman key exchange (Example in Golang)The Diffie-Hellman key exchange protocol, named after its inventors Whitfield Diffie and Martin Hellman, is a fundamental method in cryptography for securely exchanging cryptographic keys over a public channel. Published in 1976, it was one of the ea...Discuss·57 readsCryptographyKey exchange
Ek Javadjavadweb3.hashnode.dev·Mar 18, 2024Token VS Coin: Unraveling the Great Crypto ConfusionThe world of cryptocurrency encompasses both tokens and coins. While these terms are sometimes used interchangeably, there are some key differences between the two that are important to understand. Cryptocurrency tokens and coins are digital assets t...Discusscoin vs token
Karlygash Yakiyayevakarlygash-yakiyayeva.dev·Mar 18, 2024Public Key Authentication in LinuxThe motivation for using public key authentication over simple passwords is security. Public key authentication provides cryptographic strength that even extremely long passwords can not offer. With SSH, public key authentication improves security co...DiscussLinuxDevops
Osama Shaikhblog.osshaikh.com·Mar 17, 2024Azure HSM: Navigating RBI Compliance for FSIIntroduction As a technology enthusiast I recently had the opportunity to dive deep into the world of Azure Managed Hardware Security Modules (HSMs) for FSI customer. These powerful cryptographic guardians play a pivotal role in helping Non-Banking F...Discuss·66 reads#FSI
Mohamed Ismail Sihssmaheel.hashnode.dev·Mar 16, 2024Shielding Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐Hey There, 👋 Awesome Developers! 🚀 Today, let's explore the AES-GCM encryption and decryption with code examples in JS, TS, Java and Python. If you're eager to enhance your data protection skills! 👇 Let's get started! Introduction 🚀 Ever felt wor...DiscussJavaScript