Categories
Shor's algorithm
Blockchain

Shor’s algorithm against blockchain

Peter Shor and his algorithm Scientists are amazing people, they just can’t live without inventions or discoveries. And then the whole world has to think what to do with these discoveries. For example, atomic energy is as useful as it is dangerous. And Peter Shor with his algorithm is a

Read More »
quantum computer vulnerability
Encryption

One important “but”: The Quantum Vulnerability

There is another important nuance, which concerns encryption algorithms. In particular, asymmetric ones. As a rule, when we talk about the cryptographic robustness of algorithms, we are referring to cryptanalysis performed with classical computers. But quantum computers already exist. Quantum computer vs classic computer What is the difference between a

Read More »
The Asymmetric Algorithm ECDSA
Encryption

The Asymmetric Algorithm ECDSA

We told in detail about the asymmetric encryption. And the RSA algorithm which is currently outdated. Now we are talking about another well – known algorithm of asymmetric encryption. This is ECDSA (Elliptic Curve Digital Signature Algorithm). What is ECDSA Unlike RSA, ECDSA is based on far more complex mathematical

Read More »
rsa
Encryption

Asymmetric algorithm RSA

The most important and interesting about encryption. A series of articles understandable even to non-specialists. Asymmetric encryption was previously discussed in this article. One of the most recognized asymmetric encryption algorithms is RSA, named after the initials of its creators – Rivest, Shamir, and Adleman. The algorithm was developed since the

Read More »
Asymmetric encryption
Encryption

Asymmetric Encryption

The most important and interesting about encryption. A series of articles understandable even to non-specialists. From our previous articles, general information about encryption, symmetric encryption, andits algorithms was discussed. Here, we will focus on asymmetric encryption. Asymmetric encryption applies two keys: the public key and private key, and so the encryption is called asymmetric. The

Read More »
Symmetric Encryption Algorithms
Encryption

Symmetric encryption algorithms

The most important and interesting about encryption. A series of articles understandable even to non-specialists. Just as the title implies, this article is all about symmetric encryption. Without further ado, let’s head into the algorithms of symmetric encryption. One of the well-known and widely used algorithms of symmetric encryption was DES (Data

Read More »
symmetric encryption
Encryption

Symmetric Encryption

The most important and interesting about encryption. A series of articles understandable even to non-specialists. You can read about encryption basic concepts in our previous article. Here we are talking about symmetric encryption. Symmetric encryption is characterized by the fact that the same key is used to encrypt the original data and then

Read More »
Encryption

What is Encryption: basic concepts

The most important and interesting about encryption. A series of articles understandable even to non-specialists. Many a man associate encryption with military intelligence or the search for ancient treasures following mysterious notes. But in fact, encryption has long been our daily life. Every day we sit in front of computers,

Read More »

Decentralized VPN service of a new generation based on the post-quantum blockchain

40% off

don't miss it!