Tag

cryptography

1 views collected around this technical thread.

Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESHashingRSA
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
AntTech
AntTech
Apr 23, 2025 · Information Security

Two Ant Group Research Papers on FHE Accelerators Accepted at ISCA 2025

The International Symposium on Computer Architecture (ISCA) 2025 accepted two Ant Group research papers—FAST and Neo—detailing novel fully homomorphic encryption accelerators that combine cryptographic optimizations with hardware design to achieve significant performance gains for privacy‑preserving computation.

Ant GroupFHEISCA 2025
0 likes · 4 min read
Two Ant Group Research Papers on FHE Accelerators Accepted at ISCA 2025
AntTech
AntTech
Apr 2, 2025 · Information Security

ISO/IEC 25330-3 Standard on Oblivious Transfer Extension Approved, Led by Ant Group

The ISO/IEC JTC 1/SC 27 plenary meeting in Virginia approved the ISO/IEC 25330 Part 3 standard on Oblivious Transfer Extension, a cryptographic protocol standardized by Ant Group with contributions from Chinese researchers, aiming to improve OT efficiency and interoperability for secure multi‑party computation.

Ant GroupISO/IEC 25330Oblivious Transfer
0 likes · 4 min read
ISO/IEC 25330-3 Standard on Oblivious Transfer Extension Approved, Led by Ant Group
Test Development Learning Exchange
Test Development Learning Exchange
Mar 24, 2025 · Information Security

Understanding Asymmetric Encryption and Its Application in API Automation

This article explains the fundamentals of asymmetric encryption, its key concepts, common application scenarios such as HTTPS and blockchain, provides a Python RSA implementation, and outlines how to apply it securely in API automation testing, including best practices and precautions.

API securityRSAasymmetric encryption
0 likes · 5 min read
Understanding Asymmetric Encryption and Its Application in API Automation
Cognitive Technology Team
Cognitive Technology Team
Mar 22, 2025 · Information Security

Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances

The article examines how cryptographic watermarking can secure AI‑generated content by embedding robust, undetectable, and unforgeable signatures, reviews existing methods such as SynthID and Video Seal, and discusses recent research using pseudo‑random codes, error‑correcting codes, and diffusion inversion to improve watermark resilience.

AI watermarkingLDPCcryptography
0 likes · 9 min read
Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances
Raymond Ops
Raymond Ops
Mar 18, 2025 · Information Security

Master OpenSSL: From Symmetric Encryption to Digital Certificates

This comprehensive guide explains OpenSSL’s role in cryptography, covering symmetric and asymmetric encryption, hashing, key generation, certificate creation, and practical command‑line examples for encrypting files, managing keys, signing data, and configuring TLS servers, empowering readers to master secure communications.

OpenSSLcommand linecryptography
0 likes · 24 min read
Master OpenSSL: From Symmetric Encryption to Digital Certificates
Python Programming Learning Circle
Python Programming Learning Circle
Feb 15, 2025 · Information Security

Building a File Encrypter in Python with AES and PBKDF2

This tutorial walks readers through building a Python‑based file encrypter using the Pycryptodome library, covering AES‑CBC encryption, PBKDF2 key derivation, functions for encrypting and decrypting files, environment setup on Windows, macOS and Linux, and a simple driver script for testing.

AESFile SecurityPython
0 likes · 12 min read
Building a File Encrypter in Python with AES and PBKDF2
Python Programming Learning Circle
Python Programming Learning Circle
Jan 21, 2025 · Blockchain

Understanding Private/Public Keys and Addresses in Ethereum Using Python

This article explains the relationship between private keys, public keys, and addresses in Ethereum, describes the signing and verification processes, and provides Python code examples using the eth_account library to generate keys, sign messages, verify signatures, and derive addresses.

EthereumPrivateKeyPublicKey
0 likes · 5 min read
Understanding Private/Public Keys and Addresses in Ethereum Using Python
IT Architects Alliance
IT Architects Alliance
Jan 12, 2025 · Fundamentals

Quantum Computing: Principles, Applications, and Impact on IT Architecture

The article explains how quantum computing, with its qubit superposition and exponential speed‑up, is reshaping IT hardware and software, enabling breakthroughs in drug discovery, finance, AI, and secure communications while facing commercialization challenges such as high costs and talent gaps.

Artificial IntelligenceIT architectureQuantum Computing
0 likes · 12 min read
Quantum Computing: Principles, Applications, and Impact on IT Architecture
AntTech
AntTech
Dec 6, 2024 · Information Security

Ant Financial's MorseCrypto Wins First Place in the 2024 Financial Cipher Cup Second Stage with High‑Performance SM2/SM3/SM4 Implementations

Ant Financial's MorseCrypto team secured first place in the 2024 Financial Cipher Cup second‑stage competition by delivering highly optimized SM2, SM3, and SM4 implementations on X86 and ARM platforms that achieve up to 4.3‑times faster verification while meeting strict security and memory constraints.

Performance OptimizationSM2SM3
0 likes · 4 min read
Ant Financial's MorseCrypto Wins First Place in the 2024 Financial Cipher Cup Second Stage with High‑Performance SM2/SM3/SM4 Implementations
Test Development Learning Exchange
Test Development Learning Exchange
Dec 3, 2024 · Information Security

Implementing a Simple Data Encryption Algorithm Using Caesar Cipher in Python

This tutorial explains the fundamentals of data encryption, introduces the concept of differential privacy, and guides you through implementing and testing a simple Caesar Cipher encryption and decryption algorithm in Python, complete with code examples and execution instructions.

PythonSymmetric Encryptioncaesar-cipher
0 likes · 6 min read
Implementing a Simple Data Encryption Algorithm Using Caesar Cipher in Python
Test Development Learning Exchange
Test Development Learning Exchange
Dec 2, 2024 · Information Security

Implementing a Simple Caesar Cipher for Data Encryption in Python

This tutorial explains the fundamentals of data encryption, introduces differential privacy, and guides you through implementing a simple Caesar Cipher encrypt‑and‑decrypt program in Python, complete with code examples, execution instructions, and sample output.

Pythoncaesar-ciphercryptography
0 likes · 7 min read
Implementing a Simple Caesar Cipher for Data Encryption in Python
Architecture Development Notes
Architecture Development Notes
Nov 21, 2024 · Fundamentals

Master the Rail Fence Cipher in Rust: A Step‑by‑Step Mini Challenge

This mini Rust challenge walks you through implementing and decoding the classic Rail Fence Cipher, explaining the zig‑zag encoding process, demonstrating the ciphertext layout, and providing a complete Rust solution with code examples to help you practice reading and writing Rust code.

Programming ChallengeRail Fence CipherRust
0 likes · 3 min read
Master the Rail Fence Cipher in Rust: A Step‑by‑Step Mini Challenge
Model Perspective
Model Perspective
Nov 20, 2024 · Fundamentals

Can π Encode Anything? Unveiling Its Infinite Randomness and Information Power

π’s endless, non‑repeating decimal expansion behaves like a universal information reservoir: any finite digit sequence—birthdates, historic years, or arbitrary data—appears somewhere, and if the unproven normal‑number hypothesis holds, π could serve as an infinite random number generator for cryptography, art, and scientific modeling.

cryptographydata hidinginformation theory
0 likes · 6 min read
Can π Encode Anything? Unveiling Its Infinite Randomness and Information Power
AntTech
AntTech
Nov 13, 2024 · Artificial Intelligence

Nimbus: Secure and Efficient Two‑Party Inference for Transformers

The article introduces Nimbus, a novel two‑party privacy‑preserving inference framework for Transformer models that accelerates linear‑layer matrix multiplication and activation‑function evaluation through an outer‑product encoding and distribution‑aware polynomial approximation, achieving 2.7‑4.7× speedup over prior work while maintaining model accuracy.

Privacy-Preserving AIcryptographysecret sharing
0 likes · 6 min read
Nimbus: Secure and Efficient Two‑Party Inference for Transformers
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 12, 2024 · Information Security

How to Compute an MD5 Hash of a String in Java Using MessageDigest

This article explains how to generate an MD5 hash for a string in Java with the java.security.MessageDigest class, provides a complete example program, details each step of the MD5 algorithm, and describes the core methods and internal workings of MessageDigest for cryptographic hashing.

HashingJavaMD5
0 likes · 12 min read
How to Compute an MD5 Hash of a String in Java Using MessageDigest
AntTech
AntTech
Oct 31, 2024 · Information Security

Coral: A Maliciously Secure Computation Framework for Packed and Mixed Circuits

Ant Group’s cryptography lab introduced Coral, a new maliciously secure multi‑party computation framework that leverages a reverse multiplication‑friendly embedding (RMFE) to efficiently handle packed and mixed circuits, enhancing security from semi‑honest to fully malicious models and delivering practical performance improvements.

Ant GroupMPCMalicious Security
0 likes · 4 min read
Coral: A Maliciously Secure Computation Framework for Packed and Mixed Circuits
Cognitive Technology Team
Cognitive Technology Team
Oct 27, 2024 · Blockchain

What Is Blockchain? Core Concepts and Fundamentals

This article explains blockchain by distinguishing its narrow definition as a cryptographically linked data structure from its broader view as a decentralized infrastructure, and then details blocks, headers, bodies, hash functions, chain structure, Merkle trees, timestamps, asymmetric encryption, P2P networking, data propagation, and validation mechanisms.

ConsensusMerkle treeblockchain
0 likes · 11 min read
What Is Blockchain? Core Concepts and Fundamentals
IT Services Circle
IT Services Circle
Oct 22, 2024 · Information Security

Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark

This article provides a step‑by‑step analysis of a TLS 1.2 HTTPS handshake captured with Wireshark, explaining the ClientHello, ServerHello, certificate parsing, key‑exchange messages, master secret derivation, and the final encrypted application data exchange.

HTTPSTLSTLS Handshake
0 likes · 14 min read
Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark
AntTech
AntTech
Oct 21, 2024 · Information Security

Second Homomorphic Encryption Computing Performance Optimization Forum – Hardware Accelerators

The second Homomorphic Encryption Computing Performance Optimization Forum, held on October 26 at the Summer Garden venue, gathers leading researchers to discuss hardware acceleration, cross‑disciplinary challenges, and recent advances in privacy‑preserving computation, presenting detailed abstracts and speaker bios for five technical sessions.

ConferencePerformance Optimizationcryptography
0 likes · 9 min read
Second Homomorphic Encryption Computing Performance Optimization Forum – Hardware Accelerators