Andrew MartinezforOpenZiti Tech Blogopenziti.hashnode.net·Oct 19, 2022High-Level Public/Private CryptographyI find myself writing this high-level overview of public/private key cryptography often. Sometimes I even call it "an overview of asymmetric encryption." It depends on my mood. Rather than hunt for a simple overview and fail to find one I like, I cre...Discuss·1 like·136 readspublic-key cryptgraphy
lumungeformindwebmindweb.hashnode.net·Aug 16, 2022Key generation, Signing and Verifying transactions in Bitcoin.The Elliptic Curve finds applications in public-key cryptography, specifically a cryptographic algorithm referred to as the Elliptic Curve Digitial Signature Algorithm. In this article, using python we will implement three functions, the first for ge...Discuss·41 readsBitcoin
lumungeformindwebmindweb.hashnode.net·Aug 25, 2022Creating a HD Wallet From Seed.In this article, we learn how a Bitcoin HD Wallet is created from a generated seed. Deterministic wallets solve the issue of address reuse and management of multiple keys by using a single seed that can be a 128, 256, or 512-bit random number as the...DiscussCryptography
Aditya Kumar Singhforblogs@saditya9211saditya9211.hashnode.net·Oct 21, 2022Public Key CryptographyIn the previous article, I discussed an overview of symmetric key cryptographic systems. The major drawback of such a system that held symmetric key cryptography to be used widely in business circles was the exchange of keys over an insecure channel....Discuss·319 readspublic-key cryptgraphy
Andrew MartinezforOpenZiti Tech Blogopenziti.hashnode.net·Oct 19, 2022High-Level Public/Private CryptographyI find myself writing this high-level overview of public/private key cryptography often. Sometimes I even call it "an overview of asymmetric encryption." It depends on my mood. Rather than hunt for a simple overview and fail to find one I like, I cre...Discuss·1 like·136 readspublic-key cryptgraphy
Nartey Sarsofornarteysarso.hashnode.net·Aug 30, 2022How Ethereum Addresses are GeneratedIntroduction One of the fundamental requirements for interacting with the blockchain is a blockchain address or account (Externally Owned Account). An account on the blockchain serves as an identity. Due to its cryptographic underpinning, the account...Discuss·39 readsethereum address
lumungeformindwebmindweb.hashnode.net·Aug 25, 2022Creating a HD Wallet From Seed.In this article, we learn how a Bitcoin HD Wallet is created from a generated seed. Deterministic wallets solve the issue of address reuse and management of multiple keys by using a single seed that can be a 128, 256, or 512-bit random number as the...DiscussCryptography
lumungeformindwebmindweb.hashnode.net·Aug 25, 2022Generating a Wallet Address From a Private Key.In a previous article, we learned how to generate private keys using python. In order to generate private keys and make sure that no one else knows about them, we can opt to generate them ourselves locally. If we opt to use third parties such as ran...Discuss·47 readsBitcoin
lumungeformindwebmindweb.hashnode.net·Aug 16, 2022Key generation, Signing and Verifying transactions in Bitcoin.The Elliptic Curve finds applications in public-key cryptography, specifically a cryptographic algorithm referred to as the Elliptic Curve Digitial Signature Algorithm. In this article, using python we will implement three functions, the first for ge...Discuss·41 readsBitcoin