Tag：cryptography

Time：2021101
Let’s talk about it todayHow can everyone’s privacy be protected from the source? All along, we live in the real worldThe emergence of the InternetCreated a channel connecting the “parallel universe”We began to have a new life in the virtual digital world Surfing the Internet has become a part of lifeOnline lifestyleIt constitutes the “new […]

Time：2021712
In cryptography, the number is usually very large. Taking ECDSA elliptic curve as an example, the private key is 256 bits So in the libsecp256k1 library, the elements of calculation are definedField. among themnIt’s 320 bits pub struct Field { pub(crate) n: [u32; 10], pub(crate) magnitude: u32, pub(crate) normalized: bool, } Implement the addition operator […]

Time：202172
Click the blue “programmer book list” to follow me Add a “star sign” to show you good articles and books every day! Recommendation list of Tencent technical team Applied Cryptography: protocols, algorithms and C source codeBruce Schneier The application field of cryptography is far more than encoding and decoding information. This book is […]

Time：202164
anonymousAnonymous communicationCripher passwordCiphertextCryptographyCryptographyCryptanalyticsCryptosystemDecryption algorithmDecryptDigital signatureEncrypt encryptionEncryption algorithmEncryption modes encryption mechanismModern cryptographyOne time keysPlaintextPrivacy mechanismsPrivately outsourcing computingPrivate ciphers encryption algorithmProtocol protocolSymmetric encryptionServer serverSecrect keySecurity problemsSecure multi party computation cryptography This work adoptsCC agreementReprint must indicate the author and the link of this article Hacking

Time：202161
A series of articles： The main tasks of cryptography The concept of cryptosystem Cryptography is not only a method to provide information security, but also a collection of mathematical techniques. There is no doubt that cryptography mainly deals with information security, but in general, in many aspects of information security, cryptography mainly provides the following […]

Time：202153
Modular operation Suppose that \\\\\\\\\\\\\\\\. If M is divided by a – R, it can be recorded as:\\ Calculation of remainder You can always find a a in Z so that A = q · m + R, where 0 / Leq r < m Since a – r = q · m (M divided […]

Time：2021427
Let’s talk about it todayHow can we protect our privacy from the source? All along, we live in the real worldThe emergence of the InternetCreated a channel to connect the parallel universeWe began to have a new life in the virtual digital world Surfing the Internet has become a part of lifeOnline lifestyleConstitute the “new […]

Time：2021420
Captfencoder is an extensible cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, special coding, miscellaneous tools, and aggregating all kinds of online tools. useMethod always downloads the executable Baidu network disk HTTPS :// pan . baidu . com / s / 1q2n1w44bvyixle5gci5oka password: k5b9 Method 2 […]

Time：2021125
Using PRNG to construct cipher stream Many pnrgs have good statistical properties, which is necessary for strong sequence ciphers. If we make a statistical test on the key stream sequence, the behavior of the output result should be very similar to the bit sequence obtained by flipping a coin. Therefore, it is natural to assume […]

Time：2021124
True random number generator (TRNG) The outstanding feature of TRNG is that its output can not be copied. For example, if we toss a coin 100 times and record the results as a 100 digit sequence, few people on earth can produce the same sequence. True random number generators are all based on physical processes. […]

Time：20201220
brief introduction Blockchain is a tamper proof shared digital distributed ledger that records transactions in public or private peertopeer networks. Distributed ledgers are distributed to all member nodes in the network. The sequential chain of blocks of encrypted hash links is used to record the history of asset exchange between peers in the network. Blockchain […]

Time：20201121
Blockchain is a new technology based on cryptography, economics and network science. For the general public, cryptography is not an easy subject to get close to, and even among the three disciplines mentioned above, we feel that the subject has the most sense of distance. However, friends living in the blockchain circle will often hear […]