Programming Tips πŸ’‘
51.6K subscribers
67 photos
10 videos
30 files
354 links
Programming & AI:
Tips πŸ’‘
Articles πŸ“•
Resources πŸ‘Ύ
Design Patterns πŸ’Ž
Software Principles βœ…

πŸ‡³πŸ‡± Contact: @MoienTajik

🎯 Buy ads: https://telega.io/c/ProgrammingTip
Download Telegram
HTTPS explained with carrier pigeons ⚑️

Cryptography can be a hard subject to understand. It’s full of mathematical proofs. πŸ€·πŸ»β€β™‚οΈ

But unless you are actually developing cryptographic systems, much of that complexity is not necessary to understand what is going on at a high level. πŸ’Ž

If you opened this article hoping to create the next HTTPS protocol, I’m sorry to say that pigeons won’t be enough. πŸ•Š

Otherwise, brew some coffee and enjoy the article. β˜•οΈ


https://t.me/pgimg/142

[ Article ] : kutt.it/https

γ€°γ€°γ€°γ€°γ€°γ€°
#HTTPS #Cryptography
@ProgrammingTip
How does RSA work❓

RSA
is an asymmetric system , which means that a key pair will be generated, a public key and a private key, obviously you keep your private key secure and pass around the public one. 🌍

The algorithm was published in the 70’s by Ron Rivest, Adi Shamir, and Leonard Adleman, hence RSA , and it sort of implement’s a trapdoor function such as Diffie’s one. πŸ›…

RSA is rather slow so it’s hardly used to encrypt data , more frequently it is used to encrypt and pass around symmetric keys which can actually deal with encryption at a faster speed. πŸƒπŸ»

https://t.me/pgimg/149


How does it work❓

This videos simply shows that how does it work πŸŒ€ :

[ Part 1 ] : kutt.it/rsa1
[ Part 2 ] : kutt.it/rsa2

γ€°γ€°γ€°γ€°γ€°γ€°
#Cryptography #RSA
@ProgrammingTip
The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms πŸ”

If you have heard about β€œSHA” in its many forms, but are not totally sure what it’s an acronym for or why it’s important, we’re going to try to shine a little bit of light on that here today. 🌈

Before we can get to SHA itself though, we need to run through what a hash is, and then we’ll get into how SSL certificates use hashes to form digital signatures. 🌐

These are critical concepts to understand before you’ll be able to follow what SHA-1 and SHA-2 are. ☝🏻


[ Article ] : kutt.it/sha256

〰️〰️〰️〰️〰️〰️
#Hash #Encryption #Cryptography
@ProgrammingTip