Harsh SahareforHarsh Sahare's blogskillcoder.hashnode.net·Apr 15, 2023Quantum ComputerQuantum Computing: A Game Changer in Cryptography Cryptography, the science of secure communication, has been an essential part of modern communication systems. It is used to keep sensitive information, such as personal data, financial transactions, ...Discuss·10 likesquantum computing
Abdullah IsmailforAbdullah Ismail's blogtorbarey.hashnode.net·Jan 19, 2023Rsa CryptographyRSA is a widely-used method for secure data transmission. It is a public-key encryption system that uses two large prime numbers to create a unique encryption key. The key can be used to encrypt and decrypt messages, ensuring that only the intended r...Engr. Henok and 5 others are discussing this6 people are discussing thisDiscuss·8 likes·287 readshttps
Jared AtandiforJared Keagojaredatandi.hashnode.net·Oct 4, 2022RSA FactoringRSA is the most widely used public-key cryptography algorithm in the world. It is also one of the most secure, with only a few known attacks that can be used to break it. but this is by design and not by accident. One of the most interesting things a...Amr Shams and 2 others are discussing this3 people are discussing thisDiscuss·6 likes·3.2K readsRSA
Harsh SahareforHarsh Sahare's blogskillcoder.hashnode.net·Apr 15, 2023Quantum ComputerQuantum Computing: A Game Changer in Cryptography Cryptography, the science of secure communication, has been an essential part of modern communication systems. It is used to keep sensitive information, such as personal data, financial transactions, ...Discuss·10 likesquantum computing
Dukeson Ehigboria O.forsampulcodemine.hashnode.net·Mar 27, 2023RSA Factoring (RSA Data Security and Cryptographic Algorithm)RSA (Rivest–Shamir–Adleman) is a Public-Key Cryptosystem/Cryptography algorithm that is widely used for secure data transmission. The name RSA is an acronym from the surnames of the 3 inventors of this wonderful data security algorithm: (Ron Rivest, ...Discuss·1 like·78 readsRSA
Marco BorettoforMarco's blogmboretto.hashnode.net·Mar 14, 2023Migrate a VPS from RSA to ed25519 keysWhen it comes to SSH keys, there are several different types you can use, including RSA and ed25519. While RSA keys have been the standard for many years, ed25519 keys are now considered the recommended key type for several reasons. One major advanta...Discussssh
Emre AslanforEmre Aslanemreaslan.hashnode.net·Feb 6, 2023A Deep Dive into the Digital Signatures, Encryption, and Hash FunctionIn an electronic world, digital signatures are used to sign documents. This signing process is performed by applying an encryption algorithm to the document. This article will generally touch on symmetric and asymmetric encryption processes, how the ...Discussdigital-signature
Abdullah IsmailforAbdullah Ismail's blogtorbarey.hashnode.net·Jan 19, 2023Rsa CryptographyRSA is a widely-used method for secure data transmission. It is a public-key encryption system that uses two large prime numbers to create a unique encryption key. The key can be used to encrypt and decrypt messages, ensuring that only the intended r...Engr. Henok and 5 others are discussing this6 people are discussing thisDiscuss·8 likes·287 readshttps
Nagaswetha MudunuriforCloudnloud Tech Communitycloudnloud.hashnode.net·Jan 7, 2023RSA Encryption🎯What is RSA encryption? 👉RSA (Rivest-Shamir-Adleman) is an algorithm used for secure data transmission. It is an asymmetric encryption that is widely used for secure data transmission.👉In RSA, each person has a pair of keys: a public key and a pr...Discuss·101 readsRSA
David Agor forDavid Agorfrontrowhub.hashnode.net·Dec 16, 2022RSA for BeginnersWhat is RSA RSA is a type of computer code that is used to keep information secure. It's called RSA because it was invented by three people named Ron Rivest, Adi Shamir, and Leonard Adleman. How RSA Works Imagine you have a locked box with a combinat...DiscussRSA
Aditya Kumar Singhforblogs@saditya9211saditya9211.hashnode.net·Oct 21, 2022Public Key CryptographyIn the previous article, I discussed an overview of symmetric key cryptographic systems. The major drawback of such a system that held symmetric key cryptography to be used widely in business circles was the exchange of keys over an insecure channel....Discuss·319 readspublic-key cryptgraphy
Jared AtandiforJared Keagojaredatandi.hashnode.net·Oct 4, 2022RSA FactoringRSA is the most widely used public-key cryptography algorithm in the world. It is also one of the most secure, with only a few known attacks that can be used to break it. but this is by design and not by accident. One of the most interesting things a...Amr Shams and 2 others are discussing this3 people are discussing thisDiscuss·6 likes·3.2K readsRSA
Jose Gabrielle Riveraforjgrivera.devjgrivera.hashnode.net·Oct 7, 2021Abandon Ship - RSA ChallengeForeword I remember the time that we held a capture-the-flag (CTF) competition in our school organization. It was a jeopardy-style and cryptography-focused CTF aimed for beginners. The Challenge I had the opportunity to contribute the most difficult ...Discuss·67 readsCryptography