Peter Gariforsomething something developmentsomethingsomethingdevde.hashnode.dev·16 hours agoWhat is Caesar's Cipher?Caesar's Cipher (Caesar's Shift Cipher) is one of the simplest and most well-known encryption techniques. Named after Julius Caesar, it works by shifting each letter in the plaintext by a fixed number of places down or up the alphabet. For example, w...DiscussGo Language
Legos Lightlegos.hashnode.dev·Nov 20, 2024Merkle Tree💡 Merkle Tree, hay còn gọi là Cây Merkle, là một cấu trúc dữ liệu quan trọng trong lĩnh vực mật mã học và khoa học máy tính, được phát minh bởi nhà mật mã học Ralph Merkle vào năm 1979. Merkle Tree đóng vai trò thiết yếu trong nhiều hệ thống lưu trữ...DiscussCryptography & Blockchainmerkle tree
Nysa Guptanysaa.hashnode.dev·Nov 1, 2024Cryptography: The Secret Code Behind Your ScreensEver wonder how your data stays private when you’re shopping online, sending a message, or logging into a bank account? Cryptography is the art (and science) that makes sure all that sensitive information remains hidden from prying eyes. Imagine it l...Discuss·1 likecybersecurity
Legos Lightlegos.hashnode.dev·Oct 31, 2024Bloom FilterGiới thiệu Bloom Filter là một cấu trúc dữ liệu có tính chất xác suất dùng để kiểm tra một phần tử có nằm trong một tập hợp hay không. Nó rất hiệu quả về mặt không gian lưu trữ và tốc độ. Bloom filter có thể trả lời hai câu hỏi chính: Phần tử có thể...DiscussCryptography & Blockchainbloom filter
J3bitokjebitok.hashnode.dev·Oct 28, 2024Cryptography: John the Ripper: The Basics (TryHackMe)In this article, I will write a write-up for John the Ripper: The Basics that the Basic Terms, Setting Up John on Your System, Cracking Basic Hashes, Cracking Windows Authentication Hashes, Cracking /etc/shadow Hashes, Single Crack Mode, Custom Rules...Discussrainbow-table
Utkarsh Kumarutkarsh89.hashnode.dev·Oct 28, 2024Encryption Evolution: From Classical Ciphers to Quantum SecurityIn today’s interconnected world, securing digital information is paramount. Encryption, the cornerstone of data protection, has evolved dramatically from its rudimentary beginnings to the sophisticated algorithms safeguarding our modern communication...Discuss·4 likesencryption
J3bitokjebitok.hashnode.dev·Oct 27, 2024Public Key Cryptography BasicsIn this article, I will write a write-up for Public Key Cryptography Basics that covers the Common Use of Asymmetric Encryption, RSA, Diffie-Hellman Key Exchange, SSH, Digital Signatures and Certificates, as well as PGP and GPG to understand how publ...DiscussCryptography
Sai Keerthan Kasulakeerthankasula.hashnode.dev·Oct 27, 2024The Client-Server Communication - SSL/TLS Handshake ProcessPrologue In this article, we’ll explore the communication process between the client (browser) and server, focusing on how they exchange data and validate each other to ensure that only the intended parties are involved and that the data remains secu...DiscussSSL/TLS
J3bitokjebitok.hashnode.dev·Oct 27, 2024Cryptography: Cryptography Basics (TryHackMe)In this article, I will write a write-up for Cryptography Basics that covers the Importance of Cryptography, Plaintext to Ciphertext, Historical Ciphers, Types of Encryption and Basic Math in cryptography and symmetric encryption. What is the standa...DiscussCryptography
JKARjonans-blog.hashnode.dev·Oct 22, 2024Understanding Cryptography: The Backbone of Modern Encryption and DecryptionIn today’s digital world, where data breaches and cyber threats are ever-evolving, cryptography plays a crucial role in protecting sensitive information. Whether you're securing your online banking, ensuring the privacy of your emails, or safeguardin...Discuss·2 likes#cybersecurity