Categories
Shor's algorithm
Blockchain

Shor’s algorithm against the blockchain

Peter Shor and his algorithm Scientists are amazing people, they just can’t live without inventions or discoveries. And then the whole world has to think what to do with these discoveries. For example, atomic energy is as useful as it is dangerous. We have an interesting situation with Shor’s algorithm.

Read More »
quantum vulnerability
Encryption

One important “but”: The Quantum Vulnerability

The most important and interesting about encryption. A series of articles understandable even to non-specialists. There is another important nuance, which concerns encryption algorithms, asymmetric ones in particular. When we talk about the cryptographic robustness of algorithms, we mean cryptanalysis performed through a use of the classical computer. But quantum computers already exist.

Read More »
hybrid encryption
Encryption

The advantages and disadvantages of asymmetric algorithms and hybrid encryption

The most important and interesting about encryption. A series of articles understandable even to non-specialists. In comparing symmetric and asymmetric algorithms, we find out each type has its advantages and disadvantages. Thus, asymmetric encryption algorithms are more “cumbersome” when compared with symmetric ones. If the amount of data is the same, the asymmetric

Read More »
The Asymmetric Algorithm ECDSA
Encryption

The Asymmetric Algorithm ECDSA

The most important and interesting about encryption. A series of articles understandable even to non-specialists. We have mentioned in detail, the asymmetric encryption and the RSA algorithm being outdated. We will now talk about another well – known algorithm of asymmetric encryption ECDSA (Elliptic Curve Digital Signature Algorithm). Unlike RSA, ECDSA is based on far

Read More »
rsa
Encryption

Asymmetric algorithm RSA

The most important and interesting about encryption. A series of articles understandable even to non-specialists. Asymmetric encryption was previously discussed in this article. One of the most recognized asymmetric encryption algorithms is RSA, named after the initials of its creators – Rivest, Shamir, and Adleman. The algorithm was developed since the

Read More »
Asymmetric encryption
Encryption

Asymmetric Encryption

The most important and interesting about encryption. A series of articles understandable even to non-specialists. From our previous articles, general information about encryption, symmetric encryption, andits algorithms was discussed. Here, we will focus on asymmetric encryption. Asymmetric encryption applies two keys: the public key and private key, and so the encryption is called asymmetric. The

Read More »
Symmetric Encryption Algorithms
Encryption

Symmetric encryption algorithms

The most important and interesting about encryption. A series of articles understandable even to non-specialists. Just as the title implies, this article is all about symmetric encryption. Without further ado, let’s head into the algorithms of symmetric encryption. One of the well-known and widely used algorithms of symmetric encryption was DES (Data

Read More »
symmetric encryption
Encryption

Symmetric Encryption

The most important and interesting about encryption. A series of articles understandable even to non-specialists. You can read about encryption basic concepts in our previous article. Here we are talking about symmetric encryption. Symmetric encryption is characterized by the fact that the same key is used to encrypt the original data and then

Read More »
Encryption

What is Encryption: basic concepts

The most important and interesting about encryption. A series of articles understandable even to non-specialists. Many a man associate encryption with military intelligence or the search for ancient treasures following mysterious notes. But in fact, encryption has long been our daily life. Every day we sit in front of computers,

Read More »

Decentralized VPN service of a new generation based on the post-quantum blockchain

40% off

don't miss it!