Being security is one of the utmost considerations in current web site/ application development process, I am sure you have spent a lot of time writing codes to handle encryption in your applications. 540 more words

## Tags » RSA

#### Factor N given e and d

Problem: Given a pair of public and private RSA keys, factor N into p and q. 430 more words

#### Stoken 2FA - A 'Google Authenticator' App For Linux

If you are using a Linux-based computer, you can easily run a two factor authentication program which performs all of the functions of popular Google Authenticator app from inside your terminal. 126 more words

#### A neat data sharing technique

We needed to share some data with another company, and this related to Credit card transactions. But we did not want to share the actual card numbers (PANs), what to do. 443 more words

#### grpc-java programs using an Elliptic Curve certificate for SSL communication

**Introduction**

RSA cryptography based on the mathematical problem of factoring the product of two large prime numbers. Elliptic Curve Cryptography (ECC) is based on the algebraic structure of elliptic curves over finite fields. 657 more words

#### Jenkins SSH: Invalid PEM structure, '-----BEGIN...' missing

## Quick Solution

- Paste the RSA private key (e,g. content of ~/.ssh/id_rsa) to Jenkins, like this:
- Ensure the
`~/.ssh/known-hosts`

in Jenkins master has agent/slave host key. Like: … 67 more words

#### Send and receive protocol buffers securely with gRPC in NodeJs

Hyperledger Fabric makes use of protocol buffers and gRPC.

In certain interop messaging situations where performance is critical, XML in SOAP messages or the contract-less… 1,601 more words