HTTPS explained with carrier pigeons β‘οΈ
Cryptography can be a hard subject to understand. Itβs full of mathematical proofs. π€·π»ββοΈ
But unless you are actually developing cryptographic systems, much of that complexity is not necessary to understand what is going on at a high level. π
If you opened this article hoping to create the next HTTPS protocol, Iβm sorry to say that pigeons wonβt be enough. π
Otherwise, brew some coffee and enjoy the article. βοΈ
https://t.me/pgimg/142
[ Article ] : kutt.it/https
γ°γ°γ°γ°γ°γ°
#HTTPS #Cryptography
@ProgrammingTip
Cryptography can be a hard subject to understand. Itβs full of mathematical proofs. π€·π»ββοΈ
But unless you are actually developing cryptographic systems, much of that complexity is not necessary to understand what is going on at a high level. π
If you opened this article hoping to create the next HTTPS protocol, Iβm sorry to say that pigeons wonβt be enough. π
Otherwise, brew some coffee and enjoy the article. βοΈ
https://t.me/pgimg/142
[ Article ] : kutt.it/https
γ°γ°γ°γ°γ°γ°
#HTTPS #Cryptography
@ProgrammingTip
Telegram
Programming Tips Resources
How does RSA workβ
RSA is an asymmetric system , which means that a key pair will be generated, a public key and a private key, obviously you keep your private key secure and pass around the public one. π
The algorithm was published in the 70βs by Ron Rivest, Adi Shamir, and Leonard Adleman, hence RSA , and it sort of implementβs a trapdoor function such as Diffieβs one. π
RSA is rather slow so itβs hardly used to encrypt data , more frequently it is used to encrypt and pass around symmetric keys which can actually deal with encryption at a faster speed. ππ»
https://t.me/pgimg/149
How does it workβ
This videos simply shows that how does it work π :
[ Part 1 ] : kutt.it/rsa1
[ Part 2 ] : kutt.it/rsa2
γ°γ°γ°γ°γ°γ°
#Cryptography #RSA
@ProgrammingTip
RSA is an asymmetric system , which means that a key pair will be generated, a public key and a private key, obviously you keep your private key secure and pass around the public one. π
The algorithm was published in the 70βs by Ron Rivest, Adi Shamir, and Leonard Adleman, hence RSA , and it sort of implementβs a trapdoor function such as Diffieβs one. π
RSA is rather slow so itβs hardly used to encrypt data , more frequently it is used to encrypt and pass around symmetric keys which can actually deal with encryption at a faster speed. ππ»
https://t.me/pgimg/149
How does it workβ
This videos simply shows that how does it work π :
[ Part 1 ] : kutt.it/rsa1
[ Part 2 ] : kutt.it/rsa2
γ°γ°γ°γ°γ°γ°
#Cryptography #RSA
@ProgrammingTip
Telegram
Programming Tips Resources
The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms π
If you have heard about βSHAβ in its many forms, but are not totally sure what itβs an acronym for or why itβs important, weβre going to try to shine a little bit of light on that here today. π
Before we can get to SHA itself though, we need to run through what a hash is, and then weβll get into how SSL certificates use hashes to form digital signatures. π
These are critical concepts to understand before youβll be able to follow what SHA-1 and SHA-2 are. βπ»
[ Article ] : kutt.it/sha256
γ°οΈγ°οΈγ°οΈγ°οΈγ°οΈγ°οΈ
#Hash #Encryption #Cryptography
@ProgrammingTip
If you have heard about βSHAβ in its many forms, but are not totally sure what itβs an acronym for or why itβs important, weβre going to try to shine a little bit of light on that here today. π
Before we can get to SHA itself though, we need to run through what a hash is, and then weβll get into how SSL certificates use hashes to form digital signatures. π
These are critical concepts to understand before youβll be able to follow what SHA-1 and SHA-2 are. βπ»
[ Article ] : kutt.it/sha256
γ°οΈγ°οΈγ°οΈγ°οΈγ°οΈγ°οΈ
#Hash #Encryption #Cryptography
@ProgrammingTip
Telegram
Programming Tips Resources