Jun 9, 2021Elliptic Curve Public Key FormatsUnderstanding what is the difference Let's first define what Elliptic Curve is. Elliptic Curve is one of the main public-key cryptography cryptosystem approaches where finite field is a set of points on this curve. The general function of the elliptic curve is: y² = x³ + ax + b secp256k1…Crypto On Fingers2 min read
Jun 3, 2021Address (Cryptocurrency) VS DID (SSI)What is the common and what is the difference? Let's first define what these 2 things are. A cryptocurrency Address 🧾 is an id to identify the recipient of the transaction. In most cases is deriving from the public key 🔑 (in the case of bitcoin Address it's a hash from…Crypto On Fingers3 min read
May 25, 2021Shamir’s Secret-Sharing as a backup option of your entity at SSIAt any full SSI product, there is a question of where and how to store your seed (identity) 🔑. There are several knowns and widely used backup approaches: e.g. …Crypto3 min read
May 12, 2021RSA keys on fingersKeys generation: — Choose large primes p,q n = p * q n will be the length of the key (for RSA keys should be at least 2¹⁰²⁴) φ(n) = (p -1)(q -1) choose Kpub = e ∈ { 1, 2, 3, …, φ(n)-1 } gcd(e, φ(n)-1) = 1 (gcd its Greatest common…Rsa Keys1 min read
Mar 25, 2021Meet at the middle attackThis attack 👊 makes double encryption insufficient/almost useless , and for example, this is why DES <Data Encryption Standard> using as 3DES tripple encryption and not double . Side note: for most cases using different keys for each encryption layer. 🔑 Basic Idea 🧠 of this attack — that to…Cryptography2 min read