A Short Comparison Between Solidity and Vyper
Smart contracts are made with the concept of bringing more applications of blockchain and not just sticking to being used for cryptocurrencies. They are just simple pieces of code adding logic to a problem to find the solution. Solidity is the very first programming language that is created for writing smart contracts for the Ethereum blockchain platform. And so is Vyper but vyper is not the first programming language but has been built recently.
Zero Trust Security Model
Every day we come across a new kind of vulnerability or a zero-day attack on an application. It is quite known that nothing is 100% secure. We do observe different kinds of data breaches or accounts getting compromised. And this is something unacceptable. Every organization implements a new policy based on the recent hacks or threats, that they may or may not have suffered from. And of course, there has to be a long term solution to it.
Introduction to Finite Groups
Hello Folks, This is my first post on a topic which is of my area of interest, “CRYPTOGRAPHY”. Being from a mathematics background, it always helped me in understanding the basic concepts used behind the widely used algorithms. So, here I will be sharing some knowledge about cryptography basics and the actual mathematics behind it. Don’t worry, I will not go harsh on you 😉 The goal of my post is to give a basic insight of Finite Group upon which the entire cryptography is based.
SpidersecNinja XSS Challenges Walkthrough
Introduction: XSS challenges have always been tricky kinds of challenges, especially the ones where your normal payload would never work and you have to go through different kinds of tags, attributes, and event handlers to craft your XSS payload. DOM-based XSS challenges are no different, the only difference is, you need to analyze a bit more to understand the kind of payload to be crafted to execute it.
Understanding AES Part2
Hello Peeps, Sorry for such a late post. But now in this post, I will deep dive into the internals and the structure of the AES Algorithm. Since we have discussed with the basic definition of AES, we will get into details this time. As we know, AES is the most important symmetric key algorithm widely used in the world. We will try to understand the structure and internals of AES.
Understanding AES Part1
Hello Peeps, AES is an algorithm widely used for different applications. It is an encryption algorithm and not used for creating hashes that means you can decrypt a data using the algorithm which is not possible in case of hashes. 🙂 AES is a symmetric key algorithm which means that it uses only one key for both encryption and decryption of the data. We will deep dive into each and every part of the mechanism to understand its working.
Introduction to Fields
Hello Folks, I hope my last post was useful to you all and you could understand at least the definition that I had mentioned. Basically, it is not that easy to understand group theory at once, but I can assure you that once you are able to understand their application in Cryptography, you might start understanding it and hence, loving it as well. This had happened to me though 😛
Introduction to Rings
Hey All, This is the continuation of my previous post where I had discussed about Finite Groups. It is relevant to everyone who is willing to know about how algorithms are made and what makes them work so well in our real life. So, here we will be learning about rings but before that, let us understand what are Abelian Groups. A commutative group is called an Abelian Group. So, mathematically, we represent it as: