Piyush Kabrapiyushkabra.hashnode.dev·Nov 22, 2024OpenSSL Encryption Algorithm In LinuxOpenSSL is a robust cryptographic library that provides a wide range of algorithms for secure data encryption, hashing, and digital certificates. It supports various hash functions, including SHA-256, SHA-3, and MD5, which are commonly used to genera...52 readsopenssl
Casie Liucasie.hashnode.dev·Nov 22, 2024How to Password Protect a PDF and Unprotect it with Python [Quick & Simple]PDFs are widely used for their stability and compatibility across platforms, making them ideal for file sharing, printing, and archiving. However, this popularity also brings up the challenge of ensuring PDF security. Adding permission or open passwo...Python
Shubham Khanshubhamkhan.hashnode.dev·Oct 16, 2024Securing Your JavaScript Applications by using AES Encryption and Decryption with CryptoJSIn today's world, data security is a top priority for developers and businesses alike. One of the most widely used encryption techniques is AES (Advanced Encryption Standard), which is both fast and secure. This article will walk you through how to i...46 readsSecurityJavaScript
Shubham Khanshubhamkhan.hashnode.dev·Oct 12, 2024Step-by-Step RSA Key Generation in JavaScript and Python for BeginnersIn today’s digital world, security is a top priority. One of the key technologies that help in securing data is RSA, an asymmetric cryptographic algorithm widely used for encryption, digital signatures, and secure data transmission. Generating RSA ke...SecurityJavaScript
ByteScrum TechnologiesforByteScrum Technologiesblog.bytescrum.com·Aug 28, 2024Build a Password Manager with PythonIn today's digital world, managing multiple strong passwords is essential for protecting personal and professional data. A password manager helps you generate, store, and manage complex passwords securely. While there are many password managers avail...10 likes·421 readsPythonPython
Christopher Wilsontechshopper.hashnode.dev·Aug 12, 2024Exploring homomorphic encryption: ensuring data privacy in cloud-based applicationsIn an era where data has become one of the most valuable commodities, the need to protect it has never been more pressing. As more businesses and individuals rely on cloud-based applications for storing, processing, and sharing information, ensuring ...Homomorphic Encryption
Mukesh Kumarmkstech.hashnode.dev·Jul 9, 2024GPG Encryption/Decryption Quick GuideTo list the existing GPG keys: gpg --list-secret-keys --keyid-format=long gpg --list-signatures gpg -k --keyid-format long To generate gpg keys(Will ask for pass phrase), these commands will generate the pair of keys i.e. public and private keys wit...public gpg key
Mukesh Kumarmkstech.hashnode.dev·Jul 9, 2024The Modification Detection Code (MDC)The Modification Detection Code (MDC) is an integrity check used in OpenPGP to ensure that encrypted messages have not been tampered with. Here’s how it works: Integrity Check: When a message is encrypted, an MDC is generated and appended to the mess...MDC
Manan Shahmanan2528.hashnode.dev·May 20, 2024From Zero to Cipher: An Introductory Guide to CryptographyUnderstanding the Cryptography Cryptography is a method used to secure communication by changing plain text into a coded format called ciphertext. It uses different algorithms and protocols to keep data private, ensure its accuracy, verify identities...Cryptography
Md Shamim Ahamedshamim36.hashnode.dev·May 12, 2024Demystifying AES Key Expansion: A Deep Dive into Secure CryptographyIn the world of cryptography, AES (Advanced Encryption Standard) stands tall as one of the most widely used encryption algorithms, trusted for its robust security features. At the heart of AES lies a critical process known as key expansion, which pla...1 like#cybersecurity