Tags » Private-key


Is Bitcoin really secure? How can we trust in something that is “public”? Well, James D’Angelo has the answer.

Live long and prosper

Big Numbers

A sender encrypts the data for security with its private key. Comment on its data security

While using Asymmetric cryptography for encryption ( not for digital signature) of data only public key is used. No security if data is encrypted using private key data can be easily decrypted by using public key of same node . 11 more words

Data Security

Securing Communications for Java Processes

There are often situations when two processes need to establish a secure connection, like for example when one JVM calls another JVM using HTTP/HTTPS protocol. For providing encrypted communication channel HTTPS protocol is often used because of its widespread availabilty and firm foundation on public-private key big brother encryption systems, the big brother being the Certification Authorities (Like Versign etc.). 679 more words


How encryption works the really short version.

Encryption is essential for many of the things we do on the internet. There are two primary types of encryption.  Symmetric, in which the same key is used to encrypt and decrypt data, and public key in which the person receiving the encrypted information gives out a key that anyone can see, but once data is encrypted with that key only the private key can unlock it.   565 more words


Private key encryption: The Ultimate Cloud Protection

Privacy is in the headlines again, but this time it’s not spy agencies that have been snooping on phones, but opportunistic hackers. Over the last few days, a large number of celebrity photo leaks have resulted in one of the most public instances of privacy violation. 244 more words

IDrive Blog

SSL Part 2 - HTTPS - What is java truststore and identity store

In Part 1 we covered the basics of SSL, PKI. CA. Before we move to Part 3, it is important to understand the difference between trust store and identity store. 251 more words