-
What is an NFT
Read more: What is an NFTContributed by Ismael Stephanus. NFTs are digital assets that live on a blockchain. They are non-interchangeable with other items because they have unique properties and no two NFTs are the same. NFTs are used to represent ownership of unique items and allow for tokenizing of things like art collectibles, they are mainly secured by the…
-
Architecting secure Cross-Chain infrastructure with CCIP
Read more: Architecting secure Cross-Chain infrastructure with CCIPContributed by Mulanduleni Niilungu. Combining different blockchain networks is of great interest because it can be used to give new and enhanced services by communicating several blockchain networks. For that purpose, we can use CCIP to securely create services that use more than one blockchain network. Introduction Blockchain networks rely on their own communities and…
-
How Cryptography is applied to Off-Chain Assets
Read more: How Cryptography is applied to Off-Chain AssetsContributed by Michael Shuufeni. In this article, you will learn what are off-chain assets and how cryptography is applied to them. What are Off-Chain Assets? The current architecture of the blockchain has four layers. 1- the hardware layer is concerned with distributed trusted hardware 2-Layer 0 is concerned with the network of the blockchains. 3-…
-
Extended Euclidean Algorithm and its applications in cryptography
Read more: Extended Euclidean Algorithm and its applications in cryptographyThe Extended Euclidean Algorithm has several applications. In this post, I’ll show you a python implementation as well as some of its applications. It is used to calculate the greatest common divisor (GCD) of two numbers and also calculates two numbers x and y such that ax + by = gcd(a,b). In this post, I’ll…
-
Applications of cryptography in network security
Read more: Applications of cryptography in network securityIn this post, I’ll show you some applications of cryptography in network security. Current cryptographic algorithms are hard to understand, some of them use complex mathematics as their basic building blocks. Sometimes, this fact makes it difficult for us to see how we can apply these algorithms to provide security in a network. So, let’s…
-
What is Secure Shell (SSH) and how does it work?
Read more: What is Secure Shell (SSH) and how does it work?Secure Shell (SSH) is a network protocol used to securely communicate in an unsecured network. SSH is the protocol that most people choose to use for remote login and tunneling. There are many client applications available in different operating systems, such as: PuTTY for windows. Bitvise SSH client for windows. OpenSSH for windows. PuTTY for…