#passwords
Read more stories on Hashnode
Articles with this tag
AES stands for “Advanced Encryption Standard” and is a specification that has selected the Rijndael cipher as its symmetric key ciphering algorithm....
The post (Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc) appeared first on Qvault. This is going to be a basic introduction to hash...
The post (Very) Basic Intro To Elliptic Curve Cryptography appeared first on Qvault. This is going to be a basic introduction to elliptic curve...
A key derivation function, or KDF, derives one or many secret keys from a secret value. If you’ve ever needed to store a password in a database or...
The post (Very) Basic Shamir’s Secret Sharing appeared first on Qvault. Adi Shamir’s secret sharing is an algorithm used to share ownership of a...
HMACs and MACs are authentication codes and are often the backbone of JWT authentication systems. Let’s take a look at how they work! MAC – Message...