Tags » Private-key

Message Authentication Codes

Message Authentication Codes also known as (MACs) are similar techniques to the Digital Signatures. MACs use Symmetric keys between all parties; and they provide… 195 more words

Cybersecurity

Introduction to Hash Functions – Part 2/2

Hash function is a process of taking any input (long or short message) and return a fixed-size alphanumeric string. The output string is known as the “ 164 more words

Cybersecurity

nullcon HackIM – 2017 – Crypto 1

This challenge “Breaking Brain” took me more time than the Crypto 2… but I got it!

Very interesting challenge! I learned a lot about Bitcoin and the way they generate an address from a passphrase. 1,223 more words

Crypto

Cisco Email Security Appliance and DKIM Signing

In a previous blogpost, I already discussed DKIM signing with Exchange 2016:  SenderID, SPF, DKIM and DMARC in Exchange 2016 – Part II

Exchange out-of-the-box does support SPF checking, but DKIM signing/verifying and DMARC verifying are not supported. 992 more words

Exchange

What is Hybrid System?

Hybrid system is a basic key transport protocol that incorporates both Asymmetric and Symmetric Algorithms. In another word, this system uses a combination of both ( 282 more words

Cybersecurity

Introduction to Asymmetric Cryptography - Part 2/2

The idea of the Asymmetric Cryptography is completely different than the Symmetric Cryptography, but slightly identical. They are identical in the term of exchanging data (hidden messages). 170 more words

Cybersecurity

A BitCoin Key Generator in Java

@page { margin: 0.79in }
p { margin-bottom: 0.1in; line-height: 120% }
pre.cjk { font-family: “Nimbus Mono L”, monospace }

A BitCoin Key Generator in Java

I suppose the reader is familiar with bitcoin and cryptocurrencies etc. 557 more words
Bitcoin