Categories
Shor's algorithm
Blockchain

Shor’s algorithm against blockchain

Peter Shor and his algorithm Scientists are amazing people, they just can’t live without inventions or discoveries. And then the whole world has to think what to do with these discoveries. For example, atomic energy is as useful as it is dangerous. And Peter Shor with his algorithm is a

Read More »
Blockchain

Sharding – why does blockchain need it?

Sharding is a solution for the problem of blockchain scalability Before talking about sharding, it is worth noting essential circumstance. Any fast-growing blockchain sooner or later faces the problem of scalability. The decentralization and security of blockchain are ensured by reaching a consensus between nodes and storing all the blockchain

Read More »
Quantum computer will hack Bitcoin
Blockchain

Will the quantum computer hack Bitcoin and other cryptocurrencies?

Whether Bitcoin and its’ forks can resist quantum computing? This question divides the crypto community into two opposing groups. On the one hand, crypto-enthusiasts believe Bitcoin can resist quantum technologies. On the other hand, crypto-realists pay much more attention to quantum safety. Let’s look at the arguments of both groups

Read More »
quantum computer vulnerability
Encryption

One important “but”: The Quantum Vulnerability

There is another important nuance, which concerns encryption algorithms. In particular, asymmetric ones. As a rule, when we talk about the cryptographic robustness of algorithms, we are referring to cryptanalysis performed with classical computers. But quantum computers already exist. Quantum computer vs classic computer What is the difference between a

Read More »
The Asymmetric Algorithm ECDSA
Encryption

The Asymmetric Algorithm ECDSA

We told in detail about the asymmetric encryption. And the RSA algorithm which is currently outdated. Now we are talking about another well – known algorithm of asymmetric encryption. This is ECDSA (Elliptic Curve Digital Signature Algorithm). What is ECDSA Unlike RSA, ECDSA is based on far more complex mathematical

Read More »
TON
Blockchain

What is TON in fact. A critical view

TON – LEGENDARY ICO OF 2018 In early 2018, sensational ICO from Pavel Durov raised 1.7 billion dollars. The distinctive feature of this mega – project is a skillful PR. No official statements from Pavel Durov. And chronicle “leaks” of information on the project. Of course, Pavel Durov is a

Read More »
rsa
Encryption

Asymmetric algorithm RSA

The most important and interesting about encryption. A series of articles understandable even to non-specialists. Asymmetric encryption was previously discussed in this article. One of the most recognized asymmetric encryption algorithms is RSA, named after the initials of its creators – Rivest, Shamir, and Adleman. The algorithm was developed since the

Read More »

Decentralized VPN service of a new generation based on the post-quantum blockchain

40% off

don't miss it!