Open in app

Sign In

Write

Sign In

Pawel Gielmuda
Pawel Gielmuda

10 Followers

Home

About

Dec 8, 2022

Proof of stake

Distributed consensus about a new block in blockchain could be reached not only by solving the cryptographic puzzle (like in the bitcoin network). Instead, new blockchain networks and crypto-currencies introduce proof-of-stake consensus mechanisms. What are the differences? How is it working? And most importantly, what’s the advantage of that? The…

Security

2 min read

Proof of stake
Proof of stake
Security

2 min read


Dec 6, 2022

Why blockchain is so secure?

Previously I’ve discussed the cryptography of the Bitcoin blockchain. I mentioned that the ultimate confirmation of each block is the special hash which takes into account: - details of transactions confirmed by digital signatures - hash of the previous block - rightly picked number (nonce) which gives hash special property (i.e. that it…

Cryptography

2 min read

Why blockchain is so secure
Why blockchain is so secure
Cryptography

2 min read


Dec 1, 2022

Crypto behind the bitcoin blockchain

Bitcoin- I was skeptical hearing this word. But when I understood the cryptography behind I realized that this is a quiet revolution in IT. Let’s dig into technical details today. But before going into crypto please imagine exchanging money on the tick with your friends and family. Sometimes you lend…

Cryptography

2 min read

Crypto behind the bitcoin blockchain
Crypto behind the bitcoin blockchain
Cryptography

2 min read


Nov 29, 2022

Cipher Suites

So how is your connection to the website secured? 4 elements constitute a cipher suite of the connections: - authentication certificate, - key exchange algorithm, - encryption algorithm, - hashing function. Firstly we need to know who we are talking with. For that, we need an authentication certificate that will…

Security

2 min read

Cipher Suites
Cipher Suites
Security

2 min read


Nov 24, 2022

Digital Certificate creation

How do you know that your bank account page is the right one? Maybe choosing the first page from google will be the safest choice? But what if your google is not google itself? Hmmm… The above question could be bothering but fortunately, we have already figured out some solution…

Security

2 min read

Digital Certificate Creation
Digital Certificate Creation
Security

2 min read


Nov 22, 2022

Make a digital signature!

How can we be sure that a digitally signed document is indeed from the right person? To understand that let’s see how it works. So to make a digital signature you need: - asymmetric key pair — two keys, 1st secret which can only encrypt, 2nd public which can only decrypt …

Cryptography

2 min read

Make a digital signature!
Make a digital signature!
Cryptography

2 min read


Nov 17, 2022

How not to be overheard

We are slowly getting to a point where you will understand how secure connections are established on the internet. But before that let’s understand one more thing. If you saw my post regarding the Diffie-Helman key exchange you might be wondering: what if someone in the middle would intercept the…

Tls

2 min read

How not to be overheard
How not to be overheard
Tls

2 min read


Nov 15, 2022

How to share a secret key… by mixing colors

When I was a newbie in the secure communication world, the one thing which bothered me, was how to securely exchange the secret through the internet. I didn’t understand how is it possible to exchange information publically and not enable anyone else to generate the same secretkey. …

Security

2 min read

How to share a secret key… by mixing colors
How to share a secret key… by mixing colors
Security

2 min read


Nov 10, 2022

How to break the cipher

Let’s find out what it means to break the cipher. Someone may believe that the knowledge of how the cipher would be enough. However, in most cases, the algorithm is well known, but the goal is to find a secret key. And how to do that? You can: - check…

Security

2 min read

How to break the cipher
How to break the cipher
Security

2 min read


Nov 8, 2022

Why AES is so secure?

That’s a valid question since this standard is so popular. Firstly let’s look at the key space and compare the time of cracking it by brute force method (by checking every possible key). - For One Time Pad cipher, key length is equal to the length of plain text i.e…

Security

2 min read

Why AES is so secure?
Why AES is so secure?
Security

2 min read

Pawel Gielmuda

Pawel Gielmuda

10 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech