Tags » Private-key

How to check your SSL private key for bit strength

The command below will allow you to view the contents of the SSL private key, the contents will still be cryptic for most users, but one useful info you can get out of this is the strength of the key (i.e. 41 more words


How to use Bitcoin Key to create offline private keys

The Bitcoin Key app (discussed here) takes the place of rolling dice when creating offline private keys. This is a tutorial of how to use it to create your offline keys. 902 more words


Bitcoin Key app: Better than rolling dice?

As a result of the apparently poor numerical distribution observed rolling my hex dice (see this earlier post), I was inspired to create an app to take the place of hex dice for the purpose of creating off-line Bitcoin private keys. 394 more words



Is Bitcoin really secure? How can we trust in something that is “public”? Well, James D’Angelo has the answer.

Live long and prosper

Big Numbers

A sender encrypts the data for security with its private key. Comment on its data security

While using Asymmetric cryptography for encryption ( not for digital signature) of data only public key is used. No security if data is encrypted using private key data can be easily decrypted by using public key of same node . 11 more words

Data Security

Securing Communications for Java Processes

There are often situations when two processes need to establish a secure connection, like for example when one JVM calls another JVM using HTTP/HTTPS protocol. For providing encrypted communication channel HTTPS protocol is often used because of its widespread availabilty and firm foundation on public-private key big brother encryption systems, the big brother being the Certification Authorities (Like Versign etc.). 679 more words