Tags » RSA

RSA cryptography in PHP (How To?)

Being security is one of the utmost considerations in current web site/ application development process, I am sure you have spent a lot of time writing codes to handle encryption in your applications. 540 more words

IT

Factor N given e and d

Problem: Given a pair of public and private RSA keys, factor N into p and q. 430 more words

Math

Stoken 2FA - A 'Google Authenticator' App For Linux

If you are using a Linux-based computer, you can easily run a two factor authentication program which performs all of the functions of popular Google Authenticator app from inside your terminal. 126 more words

Technology

A neat data sharing technique

We needed to share some data with another company, and this related to Credit card transactions. But we did not want to share the actual card numbers (PANs), what to do. 443 more words

Security

grpc-java programs using an Elliptic Curve certificate for SSL communication

Introduction

RSA cryptography based on the mathematical problem of factoring the product of two large prime numbers. Elliptic Curve Cryptography (ECC) is based on the algebraic structure of elliptic curves over finite fields. 657 more words

Fabric

Jenkins SSH: Invalid PEM structure, '-----BEGIN...' missing

Quick Solution

  1. Paste the RSA private key (e,g. content of ~/.ssh/id_rsa) to Jenkins, like this:
  2. Ensure the ~/.ssh/known-hosts in Jenkins master has agent/slave host key. Like: …
  3. 67 more words
Ssh

Send and receive protocol buffers securely with gRPC in NodeJs

Hyperledger Fabric makes use of protocol buffers and gRPC.

In certain interop messaging situations where performance is critical, XML in SOAP messages or the contract-less… 1,601 more words

Fabric