Ninad Ingaletechnophileholmes.hashnode.net·Mar 28, 2021FeaturedDeciphering the German Enigma Machine“Sometimes it is the people no one can imagine anything of who do the things no one can imagine.” ― Alan Turing World War II(1939-1945) saw the use of many advanced technologies. Technological innovations like the RADAR systems, "Vergeltungswaffe 2...Nova⚡Manish and 2 others are discussing this3 people are discussing thisDiscuss·101 likes·691 readsArtificial IntelligenceSuperb Post! Knew a lot about enigma machine. 3
Suresh Kumarsureshdsk.hashnode.net·Mar 20, 2021How JSON Web Token(JWT) authentication works?What is JWT (JSON Web Token)? JSON Web Token (JWT) is an open standard (RFC 7519) for securely transmitting information between parties as JSON object. It is compact, readable and digitally signed using a private key/ or a public key pair by the Iden...Joy Antony Rebello and 1 other are discussing this2 people are discussing thisDiscuss·56 likes·15.1K readsJWT
Arjav Davearjavdave.hashnode.net·Mar 9, 2021SSL Advanced Configuration: NGINX on MAC (Part 4)The previous 3 parts are available here: Installing Nginx, Simple Configuration & Self-Signed SSL. In this part we will continue our quest to a more better and secure Nginx configuration by setting directives that will help with security & perfor...Discuss·34 likes·75 readsSSL
Abhay Singh Rathoreabhaysinghr.hashnode.net·Apr 22, 2023Cryptography Explained: Types, Techniques, and ApplicationsWhat is Cryptography: Types, Techniques, and Applications in Computer Security Cryptography is an essential aspect of computer security, protecting sensitive information from unauthorized access and ensuring its integrity. In this blog post, we will ...Discuss·10 likesCryptography
Harsh Sahareskillcoder.hashnode.net·Apr 15, 2023Quantum ComputerQuantum Computing: A Game Changer in Cryptography Cryptography, the science of secure communication, has been an essential part of modern communication systems. It is used to keep sensitive information, such as personal data, financial transactions, ...Discuss·10 likesquantum computing
Ayomide Ayanwolathecodeway.hashnode.net·Apr 14, 2023Create and Manage Cryptographically Strong Tokens with Python for Better Web Application SecuritySecret key management is a crucial aspect of a software engineer's daily routine. In this article, you will explore how to create and manage cryptographically secure keys in Python using the popular Pypi cryptography module. You will also learn the i...Discuss·11 likesPython
Hamees Sayedhamees.hashnode.net·Apr 11, 2023Git SHA 101: The Fundamentals of Git's Internal Architecture (Part 2 of 3)In the previous chapter, we covered objects and got acquainted with hexadecimal digits known as hashes. Our aim in this blog is to explain what a hash is, specifically SHA-1, and what it does as well as how Git makes use of it. How it all began Crypt...DiscussGitHub
Krupali Trivediacodeandaword.hashnode.net·Apr 6, 2023Understanding Cryptography: The Art of Hidden WritingWhat is Cryptography? Cryptography is a technique or method of applying mathematical concepts to a piece of information given some rules in order to secure the information and keep it secure from intruders. The information will be secured by the send...Discuss·26 likes·238 readsCryptography
Long Phạmsheon.hashnode.net·Apr 5, 2023Cryptography - [Crypto Hack] INTRODUCTION TO CRYPTOHACKLưu ý nho nhỏ: Các hàm trong blog này đều đến từ ngôn ngữ Python ASCII là viết tắt của American Standard Code for Information Interchange là 1 tiêu chuẩn mã hóa 7-bit (tức là nó dùng kiểu bit biểu diễn với 7 số nhị phân), tương đương trong hệ thập p...Discuss·63 readsCryptography
Shub kumarshubhkuumat.hashnode.net·Apr 4, 2023A crypto that can yield big profits in 2023Some people make money by trading, others by selling cryptocurrency after holding it for a long time, and others by mining. Did you know that there is a way to earn passive income (Crypto Staking) without selling assets? Unlike trading, here you own ...DiscussCryptocurrency
Philipp Muenspmuens.hashnode.net·Mar 30, 2023What is a Message Authentication Code and How Does it Work?This Blog Post assumes some familiarity with Hash Functions. If you want to brush up your knowledge on such you can check out my introduction to Hash Functions. A Message Authentication Code (abbreviated as MAC) is a cryptographic primitive that prot...Discuss·34 readsCryptography
Philipp Muenspmuens.hashnode.net·Mar 27, 2023What is a Hash Function and How Does it Work?Hash functions are Cryptography's workhorse. They're used in Digital Signature Algorithms, Merkle Trees, Zero Knowledge Proofs, Password Storage and many other Protocols and Cryptographic applications. A hash function is a primitive that provides int...Discuss·34 readsCryptography
Dukeson Ehigboria O.sampulcodemine.hashnode.net·Mar 27, 2023RSA Factoring (RSA Data Security and Cryptographic Algorithm)RSA (Rivest–Shamir–Adleman) is a Public-Key Cryptosystem/Cryptography algorithm that is widely used for secure data transmission. The name RSA is an acronym from the surnames of the 3 inventors of this wonderful data security algorithm: (Ron Rivest, ...Discuss·1 like·78 readsRSA