Tags » Private-key

Message Authentication Codes

Message Authentication Codes also known as (MACs) are similar techniques to the Digital Signatures. MACs use Symmetric keys between all parties; and they provide… 195 more words


Introduction to Hash Functions – Part 2/2

Hash function is a process of taking any input (long or short message) and return a fixed-size alphanumeric string. The output string is known as the “ 164 more words


nullcon HackIM – 2017 – Crypto 1

This challenge “Breaking Brain” took me more time than the Crypto 2… but I got it!

Very interesting challenge! I learned a lot about Bitcoin and the way they generate an address from a passphrase. 1,223 more words


Cisco Email Security Appliance and DKIM Signing

In a previous blogpost, I already discussed DKIM signing with Exchange 2016:  SenderID, SPF, DKIM and DMARC in Exchange 2016 – Part II

Exchange out-of-the-box does support SPF checking, but DKIM signing/verifying and DMARC verifying are not supported. 992 more words


What is Hybrid System?

Hybrid system is a basic key transport protocol that incorporates both Asymmetric and Symmetric Algorithms. In another word, this system uses a combination of both ( 282 more words


Introduction to Asymmetric Cryptography - Part 2/2

The idea of the Asymmetric Cryptography is completely different than the Symmetric Cryptography, but slightly identical. They are identical in the term of exchanging data (hidden messages). 170 more words


A BitCoin Key Generator in Java

@page { margin: 0.79in }
p { margin-bottom: 0.1in; line-height: 120% }
pre.cjk { font-family: “Nimbus Mono L”, monospace }

A BitCoin Key Generator in Java

I suppose the reader is familiar with bitcoin and cryptocurrencies etc. 557 more words