Explore >> Select a destination


You are here

blog.wesleyac.com
| | kndrck.co
5.9 parsecs away

Travel
| | Motivation In my quest to understand zero knowledge proofs from the ground up, I've decided to go back to the basics, and really understand how everyday cryptography tools work, not just how to use them. In this post, I'll attempt to explain how and why the diffie hellman key exchange protocol works, along with proofs and a working example. The examples are purely for educational purposes only! Introduction The Diffie-Hellman key exchange protocol is an algorithm that allows two parties to generate a uni...
| | hardenedvault.net
4.7 parsecs away

Travel
| | Open source platform security
| | thatsmaths.com
6.2 parsecs away

Travel
| | A digital signature is a mathematical means of verifying that an e-document is authentic, that it has come from the claimed sender and that it has not been tampered with or corrupted during transit. Digital signatures are a standard component of cryptographic systems. They use asymetric cryptography that is based on key pairs, consisting of...
| | negativesign.com
25.5 parsecs away

Travel
| This one hits close to home. I can't imagine how the NIST staff involved in creating SP 800 (and more specifically, the SP 800-90A Dual Elliptic Curve Deterministic Random Bit Generation...bit) must feel. First of all, given the definition of a deterministic system, the title itself gives me pause. Maybe there's some next-level random number theory described in the standard, but I'm not sure I'd ever want a random number generator to exhibit deterministic behavior.