Search results

According to the tag crypto, the following results have been found:

Audit of smart contract security in TON: key mistakes and tips

Hello everyone! Sergey Sobolev is here, a specialist in distributed systems security at Positive Technologies, our team is engaged in auditing smart contracts. Today I will tell you about the results of our team's research and conclusions regarding the security audit of smart contracts in the FunC and Tact languages of the TON platform.

Sonoff — Control devices with cryptocurrency

This project — A simple way to use cryptocurrencies to control devices.

Cryptography of the Middle Ages: from alchemical ciphers to magic squares

Among the bright symbols of the Middle Ages are sorcerers, witches, and alchemists who "enchant and turn mercury into gold." Cryptography at this time also went hand in hand with magic: take, for example, the ciphers of occult communities.

Worse than a flood, scarier than a fire: how to prepare your backups for a ransomware virus visit

For decades, backups have primarily protected us from physical equipment failure and accidental data corruption. A good backup system should survive a fire, a flood, and then quickly enable the business to continue normal operations. But another problem has emerged, which is much more likely than a flood and from which fireproof barriers and physical separation of sites in different cities do not save.

Internet of the future: from freedom to centralization and back

This article opens a series of materials dedicated to the problems of the modern internet, its centralization, and possible solutions. The introductory article reveals the main issue: how the internet, conceived as a free and decentralized space, has turned into a controlled and centralized network. Here and in the following articles, I will present a detailed analysis of the decentralization technology I have developed, which can offer a solution to overcome these problems.

Implementation of the "Magma" cipher in RUST

Hello! Today we continue to implement encryption. In this article, we will look at the Magma cipher algorithm, which was developed and used in the USSR.

Alice, Bob, Eve, and Mallory — the incredible life of cryptographic characters

How does a VPN work? How does a service bundle work for reliable and secure data transmission between branches and remote employees? What is quantum communication?

Encryption of backups using age and the value of simplicity

I will briefly introduce the age encryption tool. We will learn to encrypt both personal and corporate backups with one simple command, and then argue about why openssl is such a bad tool and not suitable for practical use by ordinary users/admins whose understanding of crypto algorithms is roughly expressed in the KDPV.

How to safely share information in the digital world without revealing yourself?

For example, an open-source project contributor wants to share plans while remaining anonymous.

Machine Learning and Cryptography: Getting to Know CipherGAN

Machine learning is now used to a greater or lesser extent in various industries. Cryptographic analysis is no exception. In this article, we will look at the CipherGAN generative adversarial network, which is used to determine the basic encryption mapping from banks of unpaired encrypted text and plaintext.