Lightning Network routing is a multi-depot traveling salesman problem, the only way to solve it is to simultaneously break public/private key cryptography, 24:30 mark: youtu.be/RpWt2RKTTjQ?t=14…
πŸ‘︎ 14
πŸ“°︎ r/bitcoincashSV
πŸ’¬︎
πŸ‘€︎ u/Truth__Machine
πŸ“…︎ Mar 08
🚨︎ report
Understanding Bitcoin Cryptography - Basics of Public Key Crypto/Elliptic Curves youtu.be/5JVVY8euZHU
πŸ‘︎ 9
πŸ“°︎ r/btc
πŸ’¬︎
πŸ‘€︎ u/pgh_ski
πŸ“…︎ Dec 29 2020
🚨︎ report
Understanding Bitcoin Cryptography - Basics of Public Key Crypto/Elliptic Curves youtu.be/5JVVY8euZHU
πŸ‘︎ 2
πŸ“°︎ r/CryptoCurrency
πŸ’¬︎
πŸ‘€︎ u/pgh_ski
πŸ“…︎ Dec 29 2020
🚨︎ report
Public/Private Keys & Cryptography

Hi everyone!
I've passed A+ and Network+ and I am currently studying for the Security+ exam. I have basic knowledge of cryptography (enough to pass the previous tests), but I'd really like to have a firm understanding of it. Does anyone know of a website or video that clearly explains all of this? I just get really confused on where these keys are created and where they are stored. And do you use the same private key for all encrypted communication or do you get a new one each time?

πŸ‘︎ 2
πŸ“°︎ r/CompTIA
πŸ’¬︎
πŸ‘€︎ u/smillerlou
πŸ“…︎ Dec 08 2020
🚨︎ report
What is Public Key Cryptography? twilio.com/blog/what-is-p…
πŸ‘︎ 9
πŸ“°︎ r/programming
πŸ’¬︎
πŸ‘€︎ u/mooreds
πŸ“…︎ Sep 09 2020
🚨︎ report
Can't the problem of verifying whether a file has been tampered with be done with public key cryptography? Why is blockchain needed here?
πŸ‘︎ 10
πŸ“°︎ r/VIDT
πŸ’¬︎
πŸ‘€︎ u/lTortle
πŸ“…︎ Aug 16 2020
🚨︎ report
I’ve heard that a proof showing that P = NP would break public key cryptography, but is that just for currently used methods or for all possible methods?

Basically if someone were to prove that P = NP would we never be able to implement any cryptographic scheme for public key cryptography? Are there any theoretical methods out there that we could use in case someone proves that P = NP? More generally, how screwed would we be when it comes to internet security?

πŸ‘︎ 10
πŸ“°︎ r/cryptography
πŸ’¬︎
πŸ‘€︎ u/0xE4-0x20-0xE6
πŸ“…︎ Jul 19 2020
🚨︎ report
How do you use the shortest vector problem for public key cryptography?

For the shortest vector problem, you reveal a bunch of vectors, and ask someone to combine multiples of them to find the shortest possible vector. This is a hard problem.

But what is the easy reverse problem? How do I produce a basis of vectors such that my secret short vector is indeed the shortest vector? And then what do I reveal as a public key?

πŸ‘︎ 11
πŸ“°︎ r/cryptography
πŸ’¬︎
πŸ‘€︎ u/XiPingTing
πŸ“…︎ Jul 27 2020
🚨︎ report
Simplest explanation of the math behind Public Key Cryptography onebigfluke.com/2013/11/p…
πŸ‘︎ 9
πŸ“°︎ r/programming
πŸ’¬︎
πŸ‘€︎ u/illuminated-geerd
πŸ“…︎ Jun 04 2020
🚨︎ report
Which Universities in Europe to attend for a PhD in Public Key Cryptography?

Ofcourse the answer to this question may change based on the specific subfield. Yet, I was wondering some of the first places that come in mind in Europe when the topic is Public Key Cryptography.

πŸ‘︎ 16
πŸ“°︎ r/crypto
πŸ’¬︎
πŸ“…︎ Mar 28 2020
🚨︎ report
Simplest explanation of the math behind Public Key Cryptography, seL4 is verified on RISC-V!, Using Spread Syntax to Merge Objects in JavaScript mailchi.mp/69d59c239bfc/9…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/pekalicious
πŸ“…︎ Jul 06 2020
🚨︎ report
Clearing up some misunderstandings on gpg (or public key cryptography in general)

I have read a ton of tutorials, manuals, etc. aiming at explaining gpg. Most explain in some detail which gpg commands are used to encrypt a message, how to create a key pair, how to share a public key on a key server etc. But I still have some questions concerning the details of how this all works.

  1. How does the private key look like? Is this just a plain text file containing a long sequence of seemingly random characters?
  2. Do I need to have my private key (in the form of some file, see question 1) on my disk in order to, say, decrypt a file which was encrypted with my public key as a recipient? If this is so, why do I also need a password? After all, in all tutorials it is always emphasized that under no circumstances anyone else is allowed to gain access to my private key. So as long as this is guaranteed, there should be no need to additionally type in a password.
  3. If I want to use gpg on several devices (my PC and my phone, say), can I just copy and paste my private key to my phone, and I am good to go? Is this recommended? After all, having such an important thing as my private key on a phone which I carry around on a daily basis seems risky. But if I need my private key in order to perform any non-trivial actions with gpg, it seems also necessary.

Thank you very much for answering my beginner questions!

πŸ‘︎ 3
πŸ“°︎ r/GPGpractice
πŸ’¬︎
πŸ‘€︎ u/lostwanderingdune
πŸ“…︎ Apr 05 2020
🚨︎ report
What's the difference between a public key cryptography, a One Time Pad, and the Vernam Cipher?

As I recall, they're quite unbreakable.

πŸ‘︎ 10
πŸ“°︎ r/cryptography
πŸ’¬︎
πŸ‘€︎ u/luigirovatti1
πŸ“…︎ Feb 29 2020
🚨︎ report
Public-key cryptography in pure Lua 5.1?

I want to do key exchange via public chat channels in an online game that supports Lua plugins written in pure Lua 5.1.

Unfortunately I was not able to find anything useful in pure Lua 5.1. Just some basic RSA implementations that are way below any reasonable key size.

The only actually useful library I found was a curve 25519 NaCl implementation: https://github.com/philanc/plc/ but it's for Lua 5.3 and works with 64 bit integers and bitwise operators, so it won't work in 5.1.

I already spent a whole night trying to rewrite the above mentioned NaCl implementation to make it work in 5.1 but I failed because I am neither very experienced with Lua nor in elliptic curve cryptography.

Any advice and suggestions would be greatly appreciated!

πŸ‘︎ 3
πŸ“°︎ r/lua
πŸ’¬︎
πŸ‘€︎ u/bmzat
πŸ“…︎ Feb 25 2020
🚨︎ report
This new discovery enables large prime factorisation using standard computers thus rendering obsolete all static factorising encryptions presently used in public key cryptography. youtube.com/watch?v=yd_2H…
πŸ‘︎ 23
πŸ’¬︎
πŸ‘€︎ u/unfixpoint
πŸ“…︎ Aug 12 2019
🚨︎ report
Asymmetric cryptography, also known as public-keyπŸ”‘cryptography, is one of the key components of blockchain technology.πŸ”²πŸ”ŽWhy is asymmetric encryptionβ›“different from symmetric encryption?πŸ” πŸ’πŸ»We’ll explain all of these in plain English!✍🏽 v.redd.it/95aaxqi9pug41
πŸ‘︎ 3
πŸ“°︎ r/BoogleOfficial
πŸ’¬︎
πŸ‘€︎ u/Boogle_Official
πŸ“…︎ Feb 14 2020
🚨︎ report
White House looking at public key cryptography as a replacement for social security numbers. wsj.com/articles/end-of-t…
πŸ‘︎ 726
πŸ“°︎ r/ethtrader
πŸ’¬︎
πŸ‘€︎ u/BItcoinFonzie
πŸ“…︎ Oct 04 2017
🚨︎ report
Authentification using public-key cryptography

I tried to make an experiment using public-key cryptography, I hope you guys like it and if any dev here your feedback is welcome.

Thank you.

https://medium.com/@michel.kansou/authentication-using-public-key-cryptography-with-nodejs-part-2-46dd1871611c

πŸ‘︎ 4
πŸ“°︎ r/Bitcoin
πŸ’¬︎
πŸ‘€︎ u/GhostLeader95
πŸ“…︎ Jan 06 2020
🚨︎ report
The field of quantum-safe cryptography, also called post-quantum or quantum-resistant cryptography, aims to construct public-key cryptosystems that are believed to be secure even against quantum computers. Need more information about this? Visit us on https://quube.exchange/security

The field of quantum-safe cryptography, also called post-quantum or quantum-resistant cryptography, aims to construct public-key cryptosystems that are believed to be secure even against quantum computers.

Need more information about this? Visit us on https://quube.exchange/security

πŸ‘︎ 7
πŸ“°︎ r/QuubeEx
πŸ’¬︎
πŸ‘€︎ u/QuubeExchange
πŸ“…︎ Sep 21 2019
🚨︎ report
Any plan to include Public-Key Cryptography?

Do you plan to include Public-Key Cryptography.

The existing method is not strong enough, if you can't meet physically with the person you want to exchange emails.

The way you will use to agree on a Passphrase will be difficult, and also once the passphrase is known they wouldn't be any security to those emails sent.

πŸ‘︎ 3
πŸ“°︎ r/tutanota
πŸ’¬︎
πŸ‘€︎ u/R-Inyuru
πŸ“…︎ Sep 06 2019
🚨︎ report
Rebuttal: EOS does use Public-Key Cryptography (Per the Whiteblock paper) and has close to 4000 PTS (Max)

Introduction

Early November 2018, articles hit the news that EOS is "not a blockchain":

The Research was comissioned by Consensys. From Consensys' homepage, we learn that

> ConsenSys is a global organism building the infrastructure, applications, and practices that enable a decentralized world.

If we have a look at the About Page, we learn that

> Our focus is on the ecosystem, the growth of the Ethereum network (emphasis mine), and global integration of the benefits of blockchain and tokenization.

The study was done by Whiteblock, the "Scalable Blockchain Testing Platform". If we have a look at the prnewswire press release, we learn that:

> Blockchain organizations such as Cosmos, Ethereum Community Fund, Amis, Maker DAO, IMToken, PlatON, Status, Loom Network, Coinfund, 1KX, Transference Fund, Web 3 Foundation, Grid+, MixLabs, Ledger Capital, Enterprise Ethereum Alliance, Google, Microsoft, ConsenSys and Bo Shen - Founding Partner of Fenbushi Capital & Cofounder of Bitshares, along with academic institutions such as Duke, USC, and MIT have committed to contributing resources to develop comprehensive reports based on Whiteblock's raw data (emphasis mine).

So at least a few pro-Ethereum entities have provided resources to Whiteblock. Can we expect impartiality from Whiteblock's research?

Additionally, if we have a look at the report, it was co-jointedly written by two scientist from Whiteblock and two scientists from Consensys:

https://www.screencast.com/t/8niRZaRScVJ

So we have the same party requesting an independent study of a concurrent blockchain and participating to the redaction off the final report. Conflict of interests, anyone?

About EOS and Cryptography:

EOS uses public key cryptograph

... keep reading on reddit ➑

πŸ‘︎ 60
πŸ“°︎ r/eos
πŸ’¬︎
πŸ‘€︎ u/taipalag
πŸ“…︎ Nov 03 2018
🚨︎ report
Is public-key cryptography possible?

I Came across a problem on wikipedia on list of unsolved computer science problems and i don't think i quit understand it , I'm still new to cryptography does it mean that (Can public-key cryptography be impossible to break)

πŸ‘︎ 20
πŸ“°︎ r/crypto
πŸ’¬︎
πŸ‘€︎ u/Noob_Pilot
πŸ“…︎ Nov 17 2018
🚨︎ report
Public Key Cryptography Simply Explained skerritt.blog/how-does-pu…
πŸ‘︎ 139
πŸ“°︎ r/compsci
πŸ’¬︎
πŸ‘€︎ u/bbno3
πŸ“…︎ Feb 05 2019
🚨︎ report
Public key cryptography is essential in securing all Internet communications. Need more information about this? Visit us on https://quube.exchange/security

Public key cryptography is essential in securing all Internet communications.

Need more information about this? Visit us on https://quube.exchange/security

πŸ‘︎ 4
πŸ“°︎ r/QuubeEx
πŸ’¬︎
πŸ‘€︎ u/QuubeExchange
πŸ“…︎ Sep 21 2019
🚨︎ report
RSA Cryptography, how to find public key given p,q,d

p1 = 3092551601 and q1 = 3490383433. secret key is d1 = 10719928016004921607. How do you find the public key, e1?

Ive used the euler totient function to find (p-1)*(q-1) = 10794190867245091200. But Im not too sure where to go from there. All these numbers are doing my head in.

It doesnt help that Ive gotten like three different answers, and I dont know how to verify which answer is the correct one.

Any help appreciated.

πŸ‘︎ 2
πŸ“°︎ r/HomeworkHelp
πŸ’¬︎
πŸ‘€︎ u/faweffe
πŸ“…︎ Mar 30 2019
🚨︎ report
Craig Wright discusses how Lightning Network routing is an NP-hard, multi-depot traveling salesman problem. The only way to solve the problems with LN are to simultaneously break public/private key cryptography. @24:30 mark youtube.com/watch?v=RpWt2…
πŸ‘︎ 16
πŸ“°︎ r/bitcoincashSV
πŸ’¬︎
πŸ‘€︎ u/cryptorebel
πŸ“…︎ Feb 09 2019
🚨︎ report
ELI5: Public-key cryptography

How does the public-private key system work? Why does it work?

πŸ‘︎ 47
πŸ’¬︎
πŸ‘€︎ u/AyanAC_
πŸ“…︎ Sep 04 2018
🚨︎ report
Our field of quantum-safe cryptography, also called post-quantum or quantum-resistant cryptography, aims to construct public-key cryptosystems that are believed to be secure even against quantum computers. Join the FIRST and ONLY Quantum resistant ecosystem. Join us on QUUBE today on https://quube.

Our field of quantum-safe cryptography, also called post-quantum or quantum-resistant cryptography, aims to construct public-key cryptosystems that are believed to be secure even against quantum computers.

Join the FIRST and ONLY Quantum resistant ecosystem. Join us on QUUBE today on https://quube.exchange/#

πŸ‘︎ 3
πŸ“°︎ r/QuubeEx
πŸ’¬︎
πŸ‘€︎ u/QuubeExchange
πŸ“…︎ Oct 03 2019
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.