Emin MuhammadiforArticles by Emin Muhammadiarticles.eminmuhammadi.com·Oct 28, 2024Kyber KEM: A Quantum-Resistant Lattice-Based Framework for Secure Key Encapsulation (Example in Golang)Cryptography, the science of secure communication, has evolved to address new challenges in a world where traditional encryption techniques may fall short against quantum computers. Quantum computers, capable of processing vast amounts of information...DiscussCryptographykyber
Romman Sabbirrommansabbir.com·Oct 28, 2024Data Encryption in Android: A Comprehensive Guide [PART 1]Data encryption is a fundamental part of securing mobile applications, particularly those handling sensitive information like user credentials, tokens, or files. Android provides several encryption techniques and APIs that developers can implement to...Discuss·40 readsAndroid : Security, Encryption and Secure Practicesfile-based encryption
J3bitokjebitok.hashnode.dev·Oct 27, 2024Public Key Cryptography BasicsIn this article, I will write a write-up for Public Key Cryptography Basics that covers the Common Use of Asymmetric Encryption, RSA, Diffie-Hellman Key Exchange, SSH, Digital Signatures and Certificates, as well as PGP and GPG to understand how publ...DiscussCryptography
Shubham Khanshubhamkhan.hashnode.dev·Oct 12, 2024Step-by-Step RSA Key Generation in JavaScript and Python for BeginnersIn today’s digital world, security is a top priority. One of the key technologies that help in securing data is RSA, an asymmetric cryptographic algorithm widely used for encryption, digital signatures, and secure data transmission. Generating RSA ke...DiscussSecurityJavaScript
Abishek Kafledevops.abisec.xyz·Oct 7, 2024Launch EC2 InstanceTasks For this task, create an EC2 instance with following requirements: 1) The name of the instance must be xfusion-ec2. 2) You can use the Amazon Linux AMI to launch this instance. 3) The Instance type must be t2.micro. 4) Create a new RSA...DiscussCloud PlatformsAWS
Shubham Khanshubhamkhan.hashnode.dev·Oct 4, 2024How to Protect Your Data with RSA Encryption and Decryption: A Cross-Platform ApproachIn the digital age, protecting sensitive data is more important than ever. RSA encryption is one of the most trusted ways to ensure data security. This cryptographic method is an asymmetric encryption algorithm that uses two keys — a public key for e...Discuss·26 readsSecurityPython
Xaalikhd.hashnode.dev·Jul 24, 2024🔍 Les Secrets de la Cryptographie : L'Art de Cacher Vos Messages 🕵️♂️Introduction à la Cryptographie Avez-vous déjà voulu envoyer un message secret que personne d'autre ne pourrait lire ? Bienvenue dans le monde fascinant de la cryptographie, où chaque message est un mystère à résoudre ! 🔐✨ Qu'est-ce que la cryptogra...Discuss·54 readsaes
Lakshya Choprawhoamilakshya.hashnode.dev·Jul 8, 2024Cryptographic terms and keywordsHere's a simple breakdown of all the commonly used cryptographic primitives and constructions: Note: This article is mainly concerned with classical cryptography, PQC will soon get attention. Hashing: Hashing is a process of mapping data of any size ...Discuss·12 likesCryptography
Legos Lightlegos.hashnode.dev·Jun 19, 2024Public Key Encryption - RSAIntroduction RSA is a public-key cryptosystem developed by Ron Rivest, Adi Shamir and Leonard Adleman and published in 1977. The encryption key (public key) and the decryption key (secret key) are distinct. Anyone can encrypt the message but only who...Discuss·28 readsCryptography & BlockchainRSA
Oleg Kleimanolegkleiman.hashnode.dev·Mar 9, 2024Cryptography fundamentalsTerminology We’re going to focus on math aspects of the cryptography here, but as the base stone of the discussion we assume that cryptographic strength depends on the algorithms selected, but mainly on the key strength. Modular exponentiation - givi...DiscussCryptography