sai phanindrablog.saiphanindra.com·Aug 5, 2024Fundamentals of CryptographyIn today's digital world, security is more crucial than ever. With the rise of online transactions, data storage, and communication, it's essential to ensure that sensitive information remains confidential and secure. This is where cryptography comes...DiscussCryptography and SecurityCryptography
Furkan Akalfurkanakal.com·Feb 29, 2024secp256k1 Curve | Fundamentals & Key-Pair GenerationHello everyone! Welcome to the new post of my blog. In this one, I'll try to cover the secp256k1 elliptic curve and key-generation process based on it. In the upcoming parts, we will discuss; signature generation & verification on secp256k1 and accou...Discuss·615 readsElliptic Curve Cryptographysecp256k1
Stephen Obasiobasi.hashnode.dev·Sep 24, 2023Understanding Cryptography: The Backbone of Blockchain TechnologyIntroduction Cryptocurrency and blockchain are often linked in our minds, representing the new era of digital money and decentralized transactions. But, beneath the surface, lies a fundamental question: How secure is cryptocurrency? The answer lies i...DiscussBlockchain
Travis Horntravishorn.com·Aug 2, 2023Unlocking the Power of Public Key Authentication in OpenSSH: A Comprehensive GuidePublic key authentication is a fundamental aspect of secure and efficient communication in the realm of server administration. In today's interconnected world, where safeguarding sensitive data is paramount, OpenSSH stands out as a reliable and widel...Discuss·124 readspublic-key cryptgraphy
Nehal IngoleforTeckbaker's Blogteckbakers.hashnode.dev·May 8, 2023CryptographyIn this last blog, we learn about what is cryptography? what is the use of cryptography? Implementation of the practice of client and server interacting with each other and also the use of another password if the hacker is present in the middle of...Discuss·48 readsCryptography
Aditya Kumar Singhsaditya9211.hashnode.dev·Oct 21, 2022Public Key CryptographyIn the previous article, I discussed an overview of symmetric key cryptographic systems. The major drawback of such a system that held symmetric key cryptography to be used widely in business circles was the exchange of keys over an insecure channel....Discuss·339 readspublic-key cryptgraphy
Andrew MartinezforOpenZiti Tech Blogblog.openziti.io·Oct 19, 2022High-Level Public/Private CryptographyI find myself writing this high-level overview of public/private key cryptography often. Sometimes I even call it "an overview of asymmetric encryption." It depends on my mood. Rather than hunt for a simple overview and fail to find one I like, I cre...Discuss·2 likes·134 readspublic-key cryptgraphy
Nartey Sarsonarteysarso.hashnode.dev·Aug 30, 2022How Ethereum Addresses are GeneratedIntroduction One of the fundamental requirements for interacting with the blockchain is a blockchain address or account (Externally Owned Account). An account on the blockchain serves as an identity. Due to its cryptographic underpinning, the account...Discuss·10 likes·120 readsethereum address
lumungemindweb.hashnode.dev·Aug 25, 2022Creating a HD Wallet From Seed.In this article, we learn how a Bitcoin HD Wallet is created from a generated seed. Deterministic wallets solve the issue of address reuse and management of multiple keys by using a single seed that can be a 128, 256, or 512-bit random number as the...DiscussCryptography
lumungemindweb.hashnode.dev·Aug 25, 2022Generating a Wallet Address From a Private Key.In a previous article, we learned how to generate private keys using python. In order to generate private keys and make sure that no one else knows about them, we can opt to generate them ourselves locally. If we opt to use third parties such as ran...DiscussBitcoin