Mukesh Kumarmkstech.hashnode.dev·Jul 9, 2024GPG Encryption/Decryption Quick GuideTo list the existing GPG keys: gpg --list-secret-keys --keyid-format=long gpg --list-signatures gpg -k --keyid-format long To generate gpg keys(Will ask for pass phrase), these commands will generate the pair of keys i.e. public and private keys wit...Discusspublic gpg key
Mukesh Kumarmkstech.hashnode.dev·Jul 9, 2024The Modification Detection Code (MDC)The Modification Detection Code (MDC) is an integrity check used in OpenPGP to ensure that encrypted messages have not been tampered with. Here’s how it works: Integrity Check: When a message is encrypted, an MDC is generated and appended to the mess...DiscussMDC
Manan Shahmanan2528.hashnode.dev·May 20, 2024From Zero to Cipher: An Introductory Guide to CryptographyUnderstanding the Cryptography Cryptography is a method used to secure communication by changing plain text into a coded format called ciphertext. It uses different algorithms and protocols to keep data private, ensure its accuracy, verify identities...DiscussCryptography
Md Shamim Ahamedshamim36.hashnode.dev·May 12, 2024Demystifying AES Key Expansion: A Deep Dive into Secure CryptographyIn the world of cryptography, AES (Advanced Encryption Standard) stands tall as one of the most widely used encryption algorithms, trusted for its robust security features. At the heart of AES lies a critical process known as key expansion, which pla...Discuss·1 like#cybersecurity
Mohamed Ismail Sihssmaheel.hashnode.dev·Mar 16, 2024Shielding Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐Hey There, 👋 Awesome Developers! 🚀 Today, let's explore the AES-GCM encryption and decryption with code examples in JS, TS, Java and Python. If you're eager to enhance your data protection skills! 👇 Let's get started! Introduction 🚀 Ever felt wor...DiscussJavaScript
Atchyut Preetham Pulavarthihashnode.atchyut.dev·Jan 6, 2024Unraveling the mystery behind RSA encryptionFor a better and more immersive experience, read this blog on my official blog - https://blog.atchyut.dev/blogpost/8b3ff3e755fd4624b7b9c7fff75a13b4 Hey there 👋🏼! Hope you're doing great. I'm super stoked today because we’ll be diving into RSA encry...Discussencryption
Jyotiprakash Mishrablog.jyotiprakash.org·Dec 28, 2023Bigger Example 2: Simple Text File Encryption and DecryptionQuestion: Design a program that can encrypt and decrypt a text file using a simple encryption algorithm. The user should be able to provide a key for encryption, and the program should output the encrypted text to a new file. Another option should al...DiscussC Programmingexample
Bhargav Parmarbhargavparmar.hashnode.dev·Dec 25, 2023Behind the Padlock: Exploring the World of HTTPS and Certificate SignaturesCertificates play a vital role in ensuring secure communication between clients and servers. They function as digital certificates, encrypting data transferred across networks, thus safeguarding sensitive information. The Importance of TLS Certificat...Discusshttps
Kralhexkralhex.hashnode.dev·Aug 30, 2023Understanding EncryptionIntroduction In today's digital age, where information flows freely and data is a valuable asset, ensuring the security and privacy of our digital communication has become more crucial than ever. Encryption stands as one of the cornerstones of this s...Discussencryption
Olufikayomi Jetawophickayor.hashnode.dev·Aug 19, 2023Unlocking the Secrets: Mastering Bcrypt Encryption and Decryption in NodeJsIntroduction In this article, we will be looking at the importance of encryption of passwords and how to go about it. I'll be working with the Express.js framework and MongoDB database in this article. What is Encryption and Decryption? Encryption is...Discuss·31 likes·96 readsBcrypt