paint-brush
153 Stories To Learn About Cryptographyby@learn
566 reads
566 reads

153 Stories To Learn About Cryptography

by Learn RepoOctober 9th, 2023
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Learn everything you need to know about Cryptography via these 153 free HackerNoon stories.

People Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - 153 Stories To Learn About Cryptography
Learn Repo HackerNoon profile picture

Let's learn about Cryptography via these 153 free stories. They are ordered by most time reading created on HackerNoon. Visit the /Learn Repo to find the most read stories about any technology.

The art and science of encrypting your messages before sending them out. From Hitler's Enigma to your Whatsapp messages, cryptography has seen it all.

1. Hashing Passwords In Python: Bcrypt Tutorial with Examples

Building a from-scratch server or using a lightweight framework is empowering. With that power comes responsibility, specifically the responsibility to securely store user’s passwords.

2. Cryptology Vs. Cryptography Vs. Cryptanalysis - Get your Vocabulary Right!

Many new developers are jumping right into coding (usually for those fat paychecks) without learning much about the history of Computer Science. People regarded Alan Turing as the father of Computer Science. He was first a cryptologist and mathematician. Then, he pioneered the field of CS in order to solve cryptological problems.

3. No-Click Malware Is Here: Why Enterprises Must Prioritize Identity-First Security

David Mahdi gives advice on how identity-first security helps prevent no-click malware attacks from succeeding.

4. BIP 32 Watch-Only Wallets

Bitcoin improvement proposal 32 is, in my opinion, one of the most important BIPs we have. (Thanks Peter Wuille!) BIP 32 gave us Hierarchical Deterministic Wallets. That is, the ability to create a tree of keys from a single seed.

5. How Does Symmetric and Asymmetric Public Key Cryptography Work?

Cryptography makes Blockchain Technology more robust and stands out from other technology. Cryptography which uses advance mathematical principles method in transmitting and storing the data, it stores in a way that only the person for whom the data is intended can read and process it.

6. #Mythbusting - Blockchain Is Just A Glorified Database

The most common mistake is that blockchain — the database. This error is often even allowed to be used by crypto leaders.

7. Cryptography Trends and News for 2020

Quantum Computing

8. Challenges of Working With Cryptography APIs in NodeJS

One of the main reasons that lead to insecure NodeJS applications is insecure or bad usage of cryptography APIs. Developers who are not very familiar with such APIs and the underlying crypto concepts often struggle to choose secure configuration options or to even get their code up and running.

9. KZG10, IPA, FRI, and DARKS: Analysis Of Polynomial Commitment Schemes

Among all popular polynomial commitment schemes, KZG is the best scheme in terms of succinctness but triggers security concerns.

10. Practical Cryptography with Go

What algorithm(s) to use, what is safe enough, what is not safe, which implementation, padding, what type of key, encoding, etc

11. What the Heck Is Envelope Encryption in Cloud Security?

If you are going deep into cloud security you may have seen the term “Envelope encryption”. Let’s explain the concept and why it is useful.

12. The Reason XOR is so Special in Cryptography

The reason XOR is so special in cryptography

13. Cybersecurity Threats in Crypto Exchanges Everyone Should Know

Cybercriminals have turned to utilizing a variety of tools and strategies aimed to target cryptocurrency exchange customers, steal their money, or steal.

14. Why Quantum Computing can Break Bitcoin and Ethereum Blockchain

This article talks about quantum computing and why it can break encryption in blockchains such as Bitcoin and Ethereum.

15. When Artificial Intelligence Meets Cryptography: a Pop Culture Trope

When envisioning pop culture, depending on what generation you might be born into, the perceptions range from HAL 9000’s glowing Red Eye from 2001 to Ava from Ex-Machina. However, the most modern concept of pop culture comes hand in hand with artificial intelligence. To make the experience wholesome, we look at artificial intelligence or specifically, machine language and cryptography as sister fields to see the implications of the phenomena in modern-day culture as well as in the times to come.

16. Edgar Allan Poe Was Bullish on Crypto

How Edgar Allan Poe introduced early cryptography to the masses as a master cipher solver — engaging tech, literary, and crypto communities to this day.

17. Quantum Computation and Its Possible Effects on Society

This paper will discuss what quantum computation is and the effects it can have on the way our society works.

18. Cryptographic Primitives in Blockchain : Part I

here are various such cryptographic primitives that are employed in blockchain, let's start with hash functions

19. Random Password Generator Command in Linux we Rarely Use

Password generators are now in abundance. Particularly surprising are the many web applications for this purpose.

20. Protocols Should Be Designed by Amateurs

Protocols are not handed down from on high. On the contrary, they start as a seed, which grows into a massive tree (if it’s worthy, and more importantly, if it’s nurtured). These seeds are no more than ideas, planted by individuals, perhaps in a Slack channel or, more formally, as an RFC.

21. Liberating Federated Learning for the Everyday Developer

Introduction to Federated Learning for Data Scientists on how to access sensitive datasets for training and evaluating Machine Learning Models

22. Exploring the Ironclad Encryption Standard

A look at updated encryption standards based on strides in quantum cryptography.

23. The ERC-4337 Standard: How Does It Improve Wallet Security?

What is ERC-4337? The ERC-4337 standard allows account abstraction and wallet recovery. Understanding the EIP-4337 proposal and how it secures your crypto.

24. What is a Multi-Dimensional Distributed Ledger?

Imagine if any kind of blockchain you are currently looking at is a 2D point of view of a 3D shaped blockchain. If you want to discover more read my story !

25. ZKPs or Zero Knowledge Proofs Are Evolving Blockchains [Explained in non-technical terms]

ZKP can be used for much more than just privacy. ZKPs are so versatile that it may redefine how blockchains work.

26. End-to-End Encryption Basics

Imagine, you are messaging your business partner about a super secret idea, it is worth $ 1m, will you trust the messaging application not to read your super secret conversation? No, right. No one will, still people across the world use whatsapp for such sensitive messaging (although I prefer telegram for my secret conversations). Well, turns out, it is because most messaging apps(including whatsapp) use a technique called End to End Encryption, which doesn’t allow these messaging services or their employees to read your conversations with your contacts. But how does this works, well, that is what we will try to understand here.

27. How to Secure Containers Using Docker Content Trust

Strong cryptographic assurances are needed to secure data. This is where Docker Content Trust (DCT) comes into the picture.

28. What Role Does Cryptography Play in Blockchain?

Cryptocurrencies need cryptography for two main reasons: Secure transactions and to verify these transfers.

29. Where Are We on Going Paperless, and the Adoption of Cryptographic Tech?

Over the last decade, there’s been a massive outburst of internet users across the globe. Simultaneously, there’s been a growing penetration of different digital and paperless technologies across businesses and organizations.

30. Garbled Circuits: Basic Scheme and Applications

Garbled circuits are a quite old, and surprisingly simple, cryptographic primitive and simplest form of general-purpose MPC to wrap your head around.

31. Hack The Planet (Krypton)

The particular challenge I'm speaking of is cleverly called Krypton, because it’s a crypto challenge, on the main page you are given hints and examples.

32. Better Cryptography Means a Better Bitcoin

Currently, Bitcoin is quite limited in regards to its cryptography and reaching its true decentralization potential. One of my aims is to change all that. Bitcoin has the problem of an increasingly large carbon footprint, potential threats to it being breakable, and specialized brute force attacks that are becoming increasingly complex.

33. Is There a Future for Cryptocurrencies Without Privacy Features?

Many people think that Bitcoin, Ethereum, and other public blockchains all offer privacy by default. Unfortunately, that is not the case

34. An Introduction to Key Derivation Functions: Argon2, Scrypt, and PBKDF2

A key derivation function, or KDF, derives one or many secret keys from a secret value. Therefore, If you've ever needed to store a password in a database or create a private key from a password, you may have used a KDF.

35. Stop With the Obfuscation: Encoding and Encryption are Not the Same

This is a topic that has been talked about quite a bit, but I think it's an important one to reiterate to our users.

36. Antoni Zolciak, Aleph Zero's COO & CMO, talks about creating a public blockchain

Startup interview with Antoni Zolciak of Aleph Zero, a public blockchain with enhanced privacy features. We combine academic excellence with business know-how.

37. A Complete Overview of Cryptography

Cryptography provides a method for secure communication. It stops unauthorized parties from gaining access to messages between authorized parties.

38. How To Build a Minimalistic Ethereum Wallet in Python [Part 1]

In this article, we are going to build a simple Ethereum wallet from scratch using Python. During the process, we will use some cryptography and try to interact with the Ethereum blockchain. In part 1, we will generate a key pair which is compatible with the Ethereum protocol, obtain the Ethereum address from the public key and encrypt the private key using a password.

39. Using Solidity RSA Signatures for Presales and Airdrops

A gas efficient alternative to ECDSA and Merkle Trees for airdrops and presales.

40. Can the BTC - BCH - BSV Warriors Call A Truce? We're All in the Same Boat.

Hi, Joey Trend here! Lately the bitcoin, bcash, and bsv communities have been at war. We should stop the fight against one another. Instead, we should start the fight against fiat currency.

41. Does The Best Secure Email Really Exist?

In case you are not in raptures when corporations persistently feed you with targeted advertising and 'bad guys' gain access to your private data, probably you need to replace your email service to more secure analogue with reliable encryption.

42. How to Use AES-256 Cipher: Python Cryptography Examples

Need to encrypt some text with a password or private key in Python? You certainly came to the right place. AES-256 is a solid symmetric cipher that is commonly used to encrypt data for oneself. In other words, the same person who is encrypting the data is typically decrypting it as well (think password manager).

43. What Is White-Box Cryptography?

White-box cryptography combines methods of encryption and obfuscation to embed secret keys within application code. The goal is to combine code and keys in such a way that the two are indistinguishable to an attacker, and the new "white-box" program can be safely run in an insecure environment.

44. Smart Cities: Cybersecurity in the Era of IoT

A smart city is representative of urbanization in the digital world. The infrastructure of smart cities is built on embedded Internet of Things (IoT) technology. The smart city promises new opportunities and growth in the urban world. These opportunities include better connectivity, productivity, agility, and innovation. However, it is a known fact that with opportunities come challenges.

45. Could Banning Cryptography Keep the Country Safe?

Politicians in the United States have been claiming recently that end-to-end encryption is certainly too dangerous to permit. This movement is serious. Congress even introduced a bill that would remove the protections that we currently have that allow us to legally encrypt information. Lindsey Graham is one such proponent of this restrictive legislation:

46. What is Zero-Knowledge Proof ?

Let’s explain exactly what that term means in one sentence:

47. Elliptic Curve Cryptography: A Deep-Dive into its Building Blocks, Implementation, and Drawbacks

One of the most powerful types of cryptography being used nowadays is Elliptic Curve Cryptography. This method is used to secure, among others, the Cloudflare

48. You Can't Guarantee Webhook Ordering, Here's Why

This post is about one of the topics we get asked about the most: guaranteeing webhook ordering.

49. Even Before Russian Interference, US Election Tech Was Failing

The Senate Intelligence Committee recently released a report detailing Russia’s interference in the 2016 election. Russian interference is nothing new – discourse since 2016 has focused on Russia’s (technically legal) social engineering and manipulation of social networks. The report, however, confirms Russia’s definitively illegal interference with electronic voting systems, and “the US was unprepared at all levels of government for a concerted attack from a determined foreign adversary on our election infrastructure,” said Committee Chairman Richard Burr in an accompanying statement.

Given American technological capabilities, how was this interference possible?

Voting is still in the dark ages

Voting lies at the heart of democracy, yet it has failed to make the same technological advancements that we’ve come to expect in other facets of our lives. Almost five decades into the “digital revolution,” we still consider paper ballots the “secure” standard for choosing leadership.

Why don’t we vote electronically?

Implicit in our trust of paper-based systems is a distrust of technology. Although technology has the potential to revolutionize the democratic process, the digital voting systems currently in place are often far from secure.

Today’s electronic ballot boxes, when implemented incorrectly, pose astonishing risks: For example, the US’ electronic ballot systems (called DRE, which stands for “direct electronic recording”) have notoriously relied on Windows XP, a software released in 2001. In 2014, security expert Carsten Schuermann hacked into a DRE machine over a Wi-Fi network in mere minutes by exploiting Windows XP’s old security protocols.

50. How To Build JWT's in Go

Go is becoming very popular for backend web development, and JWT's are one of the most popular ways to handle authentication on API requests. In this article, we are going to go over the basics of JWT's and how to implement a secure authentication strategy in Go!

51. How To Check Whether The Mobile App On Your Phone is Authentic or Not

Have a good look at the apps you have on your Android phone. How do you ensure all of them are authentic? E.g. how can you make sure that the Instagram app that you have on your mobile is a genuine one and not a copy or fake app.

52. Three Reasons Why Open Source Cryptography Is More Secure

The purpose of cryptography is to keep information private, and the purpose of open-source is to make code public... So we shouldn't we open source our cryptography algorithms right?

53. The Government's Impact on Encryption

Anyone who has seen the movie The Imitation Game, or studied computer science in school, probably has at least a brief understanding of Enigma, Alan Turing, and some of the other fun cryptography that went on during WWII. During this time and until the 1970's, governments from around the world had near total control of all cryptographic systems.

54. An ELI5 Intro to Lattices in Cryptography

55. The Lightning Round With StevieSats: 2022 Noonies Nominee Interview - Internet Heroes

Stevie is a FinTech editor and co-founder of Womxn In Crypto, an educational community obsessed with Bitcoin and blockchain tech. She loves cryptography!

56. HMAC and MAC Explained: How To Build Secure Authentication With JWTs

HMACs and MACs are authentication codes and are often the backbone of JWT authentication systems. Let's take a look at how they work!

57. Learn the Blockchain Basics - Part 3 : Hashing Functions

With the third episode of our shared journey, we will uncover the meaning of the hashing function, share a ride on the Avalanche effect, and much more!

58. Data Fingerprinting in JavaScript

I want to talk a little about how you can use content-based addressing (aka data fingerprinting) as a general approach to make your applications faster and more secure with some practical JavaScript examples.

59. Understanding Stablecoins and DAG with Stella Dyer

Millicent is a government-backed first-mover stablecoin. Founder Stella Dyer founded the company after growing up in the UK as a refugee from the Biafran War.

60. The Nitty Gritty of Public Keys vs. Private Keys in Crypto

Cryptography is the core of cryptocurrency, and without it, none of the transactions will be secured, nor the integrity of any information is upheld.

61. How Hackers Can Brute-Force Passwords And Find A Correct Key?

Brute force attackers guess passwords, passphrases, and private keys in an attempt to eventually get the right answer and crack the security of a system, but how do they know when they have the right key?

62. The Genesis Block and The Phantom: A Story of Satoshi Nakamoto

Satoshi Nakamoto — the maverick inventor of Bitcoin — not only saw a pregnant future but also made us its midwives as well.

63. Testing Signed and Encrypted Cookies in Rails Application

Recently I’ve been refactoring the tests for a gem I maintain and I needed to test that it sets the right cookies at the right time. But the cookies in use in the gem are signed cookies and that caused a slight hiccup for me. I’d never tested the value in a signed cookie before and it wasn’t immediately obvious what to do.

64. Top 10 Best Private Encrypted Messengers Designed For Security Nuts

Being concerned with the security of online communication and information exchange is absolutely OK. It is a reflection of the fact that you are aware of global surveillance happening every second of our presence online. Our online activities are monitored, intercepted, collected, and stored. And now imagine that what you know is only the small fraction of what is really happening with our information.

65. Constants in Go Vs. Constants in Javascript

Constants can be confusing and easy to misuse in Go if you are coming from an untyped language. In this article we will learn what constants are, and when it is best to make use of them.

66. Introduction to Threshold Signatures

Today we’re announcing cross-chain zaps integration into the Symbiosis protocol.

67. Explaining The Role of Cryptography During COVID-19 [A DIY Guide]

Don’t get me wrong, it’s a funny title. It starts with how, whereas when you read it you probably wondered why.

68. Staking on ‘Finney’ Testnet to Counter Sybil Attacks is now LIVE!!

The Finney testnet was launched to avoid future Sybil attacks.

69. Elliptic Curve Cryptography: A Basic Introduction

Elliptic Curve Cryptography (ECC) is a modern public-key encryption technique famous for being smaller, faster, and more efficient than incumbents.

70. "Privacy and Zero-Knowledge Proof Are Going To Be Critical for A Free Society" - Kieran Mesquita

This article talks about zero-knowledge proof and how zero-knowledge proofs work establishing trust with technology.

71. Quantum Cryptography For Beginners: From Basics To Blockchain

Quantum cryptography creates cryptosystems based on quantum mechanics rather than a complex math problem. It is a mature tech that's in rivalry with Blockchain.

72. Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples]

If you care about your security on the web, you probably use a Two-Factor authentication (2FA) method to protect your accounts. There are various 2FA methods available out there, a combination of password + fingerprint, for example, is one of them. However, since not so many people have a fingerprint reader available all the time, one of the most popular 2FA methods today is to use an authenticator app on your cellphone to generate a temporary password that expires within a minute or even less. But, how does this temporary password, called Time-Based One-Time Password (TOTP) works, and how can I implement that on my own service?

73. Which Kind of Crypto Trader Are You?

Since the launch of Bitcoin in 2008, four trader archetypes have arrived to scoop up crypto gains and minimize crypto losses.

74. zk-SNARK Concepts Explained In Different Levels of Complexity

I’ve decided to write an ELI15 for zk-SNARK jargon since I’ve yet to come across something similar during my studies.

75. Salts and Hashes

For the time being, I want you p33ps to ignore the general meaning of these words used in daily context and give a new meaning to them for the current time being.

76. Safeguarding Your Videos with NFT Marketplace and Advanced Cryptography in Livepeer

As video content evolves, so should the security of your videos. Learn how to safeguard your videos using an NFT marketplace and advanced cryptography.

77. Developments In Developing: Computer Scientists vs Engineers

Software Engineering != Computer Science

78. Why SNARKs Are the Technology of the Coming Decade

Welcome to the SNARK Age, a pop-up newsletter exploring and celebrating a technology that we believe will have fundamental and deterministic impacts on privacy, computing, cryptography, and money in the years to come. We’ll be sharing (mostly) bite-sized issues highlighting the key events, milestones and people in the space.

79. How to Create Hidden Secret Messages in Images using Python

Today, we are gonna learn how to apply coding skills to cryptography, by performing image-based stenography which hiding involves secret messages in an image.

Stenography has been used for quite a while. Since World War II, it was heavily used for communication among allies so as to prevent the info being captured by enemies

80. Adi Shamir's Secret Sharing: An Algorithm To Share Ownership

Adi Shamir’s secret sharing is an algorithm used to share ownership of a secret among a group of participants. In order to calculate the original secret, a minimum number of shares must be used.

81. What is Quantum Key Distribution Method?

We have long sought secure ways to exchange data. Some current methods include cryptography, hashing and requiring the solution of math problems that demand enormous computing power. Quantum computing could render some of our current methods insecure and obsolete, while enabling new methods.

82. Glossary of Security Terms: Encryption

In cryptography, encryption is the conversion of cleartext into a coded text or ciphertext. A ciphertext is intended to be unreadable by unauthorized readers.

83. Secure Multi-Party Computation Use Cases

Secure Multi-Party Computation (SMPC), as described by Wikipedia, is a subset of cryptography to create methods for multiple users to jointly compute a function over their inputs while keeping those inputs private. A significant benefit of Secure Multi-Party Computation is that it preserves data privacy while making it usable and open for analysis.

84. How To Code Gas-Less Tokens on Ethereum

85. Homomorphic Encryption: Introduction And Use Cases

Organizations nowadays are storing and performing computation of the data on the cloud instead of handling themselves. Cloud Service Providers (CSPs) provide these services at an affordable cost and low maintenance. But to ensure compliance and retain privacy, organizations need to transfer the data in an encrypted format, which does ensure the confidentiality of the data. However, once the data reaches the cloud, the CSP has to decrypt the data to perform operation or computation.

86. An Intro to Shamir's Secret Sharing Cryptographic Algorithm

Adi Shamir’s Secret Sharing is a cryptographic algorithm that allows distinct parties to jointly share ownership of a single secret by holding shares

87. What it's Like to Work with a Really Terrible Developer

If you’ve never had this experience you have my envy. You’re on a development team and one of the developers does sloppy work and there is nothing you can do about it.

88. Quantum Cryptography: What Would Happen When Qubits Go Mainstream

Whether through social engineering, phishing scams, or ransomware attacks ultimately it is just a hacker and his classic computer, all that pretty much expected

89. Generating Randomness In Blockchain: Verifiable Random Function

Blockchains such as Bitcoin are facing a key problem. How to fairly spread out the decision-making consensus on what pool will win the competition and have the right to add the new block into the blockchain itself.

90. 5 Books You Can Read to Boost Your Computer Science Knowledge

Make use of your downtime and read something good!

91. Deploying AES Encryption On Cryptool 2.1

The AES encryption algorithm is a block cipher consist of a block length of 128 bits that uses the same encryption key to perform several rounds of encryption.

92. Cryptography Interference With Blockchain

Cryptography Interference With Blockchain

93. [Announcement] The ZPrize Competition For Zero Knowledge Cryptography by Aleo

ZPrize Competition. Over $2 million of cash prizes! The goal of ZPrize is to bring together the best teams at the intersection of cryptography research.

94. The Evolution of The Public-Private Key Encryption in Blockchain Systems

There are many different methods to verify a user’s identification. Although the management of authentication and active sessions has come a long way, simple password authentication has not been able to provide sufficient security to support the rapid growth in data, advancements in mobile and cloud technologies, and increasing volumes of security breaches.

95. What is Collision Resistance in Cryptography?

A short story about how national secrets, passwords, and financial data stays secret because of a small handful of smart people playing "Bet you can't"

96. Introduction to Cryptographic Hash Functions

Cryptographic Hash Functions are a class of hash functions that are cryptographically secure. From password authentication and integrity verification to blockchain—these functions are used in a multitude of applications.

97. How To Store Encrypted Data Collected By Your Web Application With PHP7 and LibSodium

Reasonable security through architecture

98. Will AES-256 Withstand The Gauntlet Thrown by Quantum Computers?

With quantum computers getting more powerful every year, many worry about the safety of modern encryption standards. As quantum computers improve in performance and the number of qubits used for calculations increase, current crypto systems are under more threat of attack.

99. Have You Contacted Your Reps to Help Block the EARN IT Act Yet?

As the world finds itself preoccupied with COVID-19, the United States government is trying to pass a law to ban encryption. It's called the EARN IT act, and while it claims to combat the sexual exploitation of children online, it has potentially devastating repercussions for encryption and companies that use it to protect your privacy online.

100. Public Key Cryptography: RSA keys

I bet you created at least once an RSA key pair, usually because you needed to connect to GitHub and you wanted to avoid typing your password every time. You diligently followed the documentation on how to create SSH keys and after a couple of minutes your setup was complete.

101. Quantum Computing and The Problem of Cryptography

Most of us are probably wondering why the world today’s going to development of new generation of computer called Quantum-Computer

102. Quantum Contingencies in Cryptography: A Short Primer

Are we at the cradle of a quantum age?

103. Web Auth Standard: Guide to Web Authentication API

Secure context This feature is available only in secure contexts (HTTPS), in some or all supporting browsers.

104. #Debunked - 4 Common Myths About NFTs

NFTs are the digitized form of any artwork, and the people interested in these artworks can buy them from NFT marketplaces.

105. An Insecure Pillar in Cybersecurity

From Caesar's cipher to RSA. A deep dive into the inner workings of modern cryptography and its potential crumbling.

106. The Ultimate Guide to Webhooks

Get a better understanding of how webhooks work, when to use them and most importantly the security measures to take to use them in practice!

107. What are the Cypherpunks Fighting For?

Cypherpunks hold an ideology that states that privacy is an essential component of freedom and without privacy, one cannot have true freedom of speech.

108. Internet Privacy Under Continued Attack by the US Government

Wars can be fought in the real world but there is also a virtual battlefield - and it is just as harmful. The Lawful Access to Encrypted Data Act is the latest attempt to access people's encrypted data and it serves as another reinforcement.

109. Random: Meaning in Everyday Life and in Science

“That’s so random!” Common phrase used to express something is unexpected or without a pattern. Does random mean something different in science?

110. On Zero-Knowledge Proofs And Why They Matter

There is a lot of enthusiasm for the application of zero-knowledge proof systems, at Dusk Network we’ve developed the open-source PLONK zero-knowledge proof system. It can be used for many things, and what better way to demonstrate its potential with an example!

111. Hack The Planet (Krypton)

The particular challenge I'm speaking of is cleverly called Krypton, because it’s a crypto challenge, on the main page you are given hints and examples.

112. Introduction to Fully Homomorphic Encryption

Exploring fully homomorphic encryption which, for a long time been considered one of the holy grails of cryptography.

113. Why Is XOR the Perfect Cipher?

XOR is a simple bitwise operation that allows cryptographers to create strong encryption systems.

114. I Built A Light And Easy to Use PGP Encryption Tool: Here's How

I once needed to generate a PGP key pair and I thought that I could maybe create my own tool in order to do so.

115. The Internet is Broken. Can Crypto Fix It?

Over four and half billion people, or fifty-nine per cent of the global population, use the Internet every day. The Internet is where we communicate, transact, and consume information.

116. A Very Basic Intro to Hash Functions: SHA-256, MD-5, etc

This is going to be a basic introduction to hash functions. I will assume most of my audience is here to gain an understanding of why hash functions are used and the basic idea of why they work. My goal is to explain it in a general sense, I will be omitting proofs and implementation details and instead focusing on the high-level principles.

117. Web Crypto API: A Low-Level Interface for Internet Security

The Web Crypto API is an interface allowing a script to use cryptographic primitives in order to build systems using cryptography.

118. Cryptographic Magic in Decentralized Storage

On Web2 or the traditional web, storage systems were designed to suit fast-growing, collaborative environments. These storage systems boasted different degrees of data availability and data security and protection from loss. As Web2 grew in adoption so did the generation of Web2 data volume and density in many formats. This data could be large files, non-transactional, often created by a single user, and may be shared over some geographical distance. This design led to the reliance on central authorities to store the world's data.

119. Zero-Knowledge Proofs: The Simplest Explanation on the Internet

history, concepts, principles, technical implementation, and development status of zero-knowledge proofs in the simplest language ever

120. Data Integrity In Cryptography

Data integrity refers to the accuracy, legitimacy, and consistency of information in a system. When a message is sent, particularly using an untrusted medium, data integrity provides us confidence that the message wasn't tampered with.

121. Understanding Quantum Cryptography

Quantum cryptography uses physics to develop a cryptosystem completely secure against being compromised without the knowledge of the sender or the receiver of the messages. The word quantum itself refers to the most fundamental behavior of the smallest particles of matter and energy.

122. 6 Not-so-obvious Tech Predictions

By the time of writing of this article everyone knows, the "technologies of the future" as listed from various mainstream media. And I agree with most of them. It is worth discussing a few not so obvious though. I expect my "predictions" to be fulfilled by 2030.

123. Slogging #26: How Scared You Are Of Deepfakes?

This Slack discussion by Arthur, Limarc, austin and richard-kubina occurred in hackernoon's official #slogging-beta channel. How scared you are of deepfakes?

124. Your Guide to the Web3 Social Graph: Value, Current Protocols, and Where it's Heading

A social graph is a mapping of social relationships between individuals. It reflects the people and their interactions through various channels.

125. How we can Better Understand PLONK

Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge, or PLONKS are a new general-purpose zer-knowledge proof scheme.

126. How to Protect Your Digital Identity

One of the biggest challenges we netizens encounter is defending freedom and human rights on the internet.

127. Zoom, Keybase and Future of Messaging

Today Zoom acquired Keybase. It came as a shock to me at first; but, it shouldn't surprise us.

128. Introduction to Cryptography: Vigenère Cipher [Part 2]

Hi again and welcome back to part 2 of the basic cryptography. Previously we discuss about what is cryptography and how fundamental and ancient problem it is in communication science. We talk about ceaser's cipher and how easy it is to break. We also talk about Substitution Cipher which was slight improvement to Ceaser' cipher but can easily be cracked using Frequency analysis technique.

129. The report on Cryptoeconomics Moscow Meetup #5: zk-cryptography

The 5th Cryptoecon Meetup has finished, and it’s time to make a short summary of everything that was discussed there. So far, it was the most interesting meetup among all that we have conducted. Zk-cryptography was discussed and it featured three guests, each of them with his own topic of progressing complexity. We wish to thank RAHIB and CryptoAcademy for the aid in organization!

130. A Step-By-Step Look into How SHA-256 Works

SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hash algorithms around.

131. Analyzing Bitcoin's Signature Size: How It Evolved Over The Years

Digital signatures are an essential building block of the Bitcoin protocol and account for a large part of the data stored on the blockchain. We detail how the size of the encoded ECDSA signatures reduced multiple times over the last years and how the proposed Schnorr signature compares to the length of the currently used ECDSA signatures.

132. Why You Should Care About Homomorphic Encryption

The hype is dead, long live the hype. After deep learning, a new entry is about ready to go on stage. The usual journalists are warming up their keyboards for blogs, news feeds, tweets, in one word, hype. This time it’s all about privacy and data confidentiality. The new words, homomorphic encryption.

133. Quantum Cryptography: The Future of Encryption

Post-quantum cryptography will involve a significant transition, and if we are not cautious, we risk experiencing the same security problems again.

134. Does Consistent Hashing Help?

Let’s start by understanding about few terminologies and some facts related to this article and come on common ground.

135. How to Revolutionize Data Security Through Homomorphic Encryption

For decades, we have benefited from modern cryptography to protect our sensitive data during transmission and storage. However, we have never been able to keep the data protected while it is being processed.

136. What If We Use Blockchain to Elect The Next President?

That 2020 US Presidential elections would be tight and a nail biter was to be expected. At least by those who had a real feel for American politics and who took critically the mainstream media propaganda and the sponsored polls for a blue landslide.

137. On Zero-Knowledge Proofs (ZKPs) And Why They Matter

There is a lot of enthusiasm for the application of zero-knowledge proof systems, at Dusk Network we’ve developed the open-source PLONK zero-knowledge proof system. It can be used for many things, and what better way to demonstrate its potential with an example!

138. How Percolate Queries in Elasticsearch Make Alerting a Breeze

Once upon a time, a company I worked for had a problem: We had thousands of messages flowing through our data pipeline each second, and we want to be able to send email and SMS alerts to ours users when messages matching specific criteria were seen.

139. Security in the Digital Age: A Case for Blockchain Identity

At present it is almost impossible to live our day-to-day lives without transacting online or using the internet for our social interactions. As of 2019 there are over 4 billion active internet users – more than half the world’s population – and worldwide the average person spends 6 hours and 42 minutes online each day.

140. Randomness and Entropy in Node and Electron

Randomness is a hard problem for computers. For this reason most functions that generate randomness are not considered cryptographically secure. That means that it is possible that an attacker can take a good guess at what number a non-secure randomness generator generated.

141. Refactoring CryptoJS in Modern ECMAScript

Repository: entronad/crypto-es

142. Digital Signatures in Cryptography: Types, Applications, Process

What is a digital signature? It’s probably not what you think it is… in fact, you’re using several right now…

143. Basic of Cryptography

What is Cryptography?

144. Building an MFA User Authentication System (Enrollment Component Code) Using Images

Most interactive Internet applications require a user to first be “registered” in order to use the application and then further require the user to “log on” each time they wish to use the application. This process of first enrolling a user and then later recognizing that user to allow them access may be described as User Authentication. This article focuses on the code and processes used in the registration component of our Authur user authentication system.

145. Cryptography-Based Voting and The US Election: Science Fiction & Stories From Potential Futures

These stories are from a two-part project. While this part is science fiction, the other part is about reality. Both parts are about mobile, blockchain, and cryptographically secure voting in the context of the US election system. (Reality Piece: link).

146. WTF is Shamir's Secret Sharing Scheme And How Does It Preserve Your Privacy?

An introduction to this privacy-preserving cryptographic technique and how Keyless is using it to transform the way we share and store private data across the internet.

147. Cracking The HMAC Message Authentication System In Cryptography

★ HMAC, a popular authentication mechanism used for authenticating a message using cryptographic hash functions.

148. An Encryption Deep Dive - Part Three

In Part 3 of their series on encryption, Chris Hickman and Jon Christensen of Kelsus and Rich Staats of Secret Stache discuss end-to-end encryption in practice.

149. Lowering the Barrier of Entry to Zero Knowledge Proofs

Next Generation Semiconductors: Designing accelerators for advanced cryptography

150. A Makeover that Changes Everything: The Bitcoin Taproot Update

The Taproot update to Bitcoin will likely be rolled out end of this year, after miners have voted on it. this article will explain why Taproot is a good thing

151. An Introduction to Web Stacks

Having recently worked with young web developers who were exposed for the first time to proper production infrastructure, I received many questions about the various components that one can find in the architecture of a "Web service". These questions clearly expressed the confusion (and sometimes the frustration) of developers who understand how to create endpoints in a high-level language such as Node.js or Python, but were never introduced to the complexity of what happens between the user's browser and their framework of choice. Most of the time they don't know why the framework itself is there in the first place.

152. SSL Certificates Publicly Prove The Identity of the Public Key Owner

In the context of public key cryptography, certificates are a way to prove the identity of the owner of a public key.

153. Cryptography-Based Voting and The US Elections: The Reality

This is a two-part project. This part is about reality. The other part is science fiction. Both are about mobile, blockchain, and cryptographically secure voting systems in the context of US elections. (Science Fiction: link)

Thank you for checking out the 153 most read stories about Cryptography on HackerNoon.

Visit the /Learn Repo to find the most read stories about any technology.