Best of CryptographyJanuary 2025

  1. 1
    Video
    Avatar of lauriewiredLaurieWired·1y

    2025 Computer Science Predictions

    Predictions for 2025 include increased adoption of RISC-V in major Linux distributions, quantum-resistant cryptographic algorithms by NIST, the continued rise of memory-safe programming languages like Rust and Go, and emerging trends in AI-generated content and background music. Moreover, expectations include the use of AI upscaling in streaming and LLMs' impact on decompiler tools and NPC interactions in gaming.

  2. 2
    Article
    Avatar of communityCommunity Picks·1y

    SSE (server sent events) is fun / Go

    Creating a live counter for a popular interior design quiz using Server-Sent Events (SSE) to keep track of user presence, quiz results, and broadcasting messages with efficient use of Go, Redis, and a thoughtful UI design. The approach emphasizes simplicity, scalability, and practical solutions for persistent connections and event handling.

  3. 3
    Article
    Avatar of planetpythonPlanet Python·1y

    The Absolute Minimum Every Python Web Application Developer Must Know About Security

    When developing Python web applications, it's essential to follow basic security principles: never store passwords in plain text, always use salted hashes or delegate password management to modern frameworks, and ensure data is encrypted both in transit and at rest. The Defence in Depth approach emphasizes multiple layers of security, including the use of TLS for network security and understanding cryptography algorithms. The guide also covers important security principles, the OWASP Top Ten vulnerabilities, and the CVE warning system.

  4. 4
    Article
    Avatar of milanjovanovicMilan Jovanović·1y

    Implementing AES Encryption With C#

    Learn how to implement AES encryption in .NET with practical code examples for both encryption and decryption. Understand the differences between symmetric and asymmetric encryption, and get insights into secure key management and best practices for protecting sensitive data like API keys and database credentials.

  5. 5
    Article
    Avatar of systemweaknessSystem Weakness·1y

    Basics of cryptography ( Part1 )

    Cryptography converts readable text into unreadable ciphertext using encryption methods. Three main types include symmetric encryption (same key for encryption/decryption), asymmetric encryption (public/private key pairs), and hashing (one-way transformation for data integrity). Practical examples and websites for implementing these methods are provided.

  6. 6
    Article
    Avatar of codigeeCodigee·1y

    Does the NSA build secret backdoors in the new encryption standards? No. In the past? Yes

    In the late 1990s and early 2000s, the NSA was found to have inserted a compromised pseudorandom number generator (PRNG) called Dual_EC_DRBG into cryptographic standards, which could potentially provide backdoor access to encrypted communications. The revelation caused significant distrust in the NSA and prompted the cryptographic community to be highly vigilant against such tampering. Today, the NSA cannot interfere in the same way due to the community's heightened awareness and scrutiny of new cryptographic standards.