Langsung ke konten utama

Postingan

Unggulan

Day 18 - Exploring the Cryptography Behind Web3, ECC and Its Threats

As we move towards the next evolution of the internet, often called Web3 , we hear a lot about decentralization, blockchain, and digital ownership. But behind all of this advanced technology lies a powerful and efficient backbone that makes it all possible: cryptography . Today, my goal is to understand two core concepts: Elliptic Curve Cryptography (ECC) , the mathematical foundation, and how it is applied in the broader Web3 ecosystem, along with the threats that come with this new paradigm. Part 1: Elliptic Curve Cryptography (ECC) - The Backbone of Modern Security What is ECC? Elliptic Curve Cryptography (ECC) is an approach to public-key (asymmetric) cryptography based on the algebraic structure of elliptic curves over finite fields. Like RSA, ECC is used to create a key pair for secure communication: Private Key: A secret, randomly selected number that is known only to the owner. Public Key: A point on the elliptic curve that is calculated from the private key ...

Postingan Terbaru

Day 17 - How Trust Works on the Internet - Digital Signatures PKI

Day 16 - The Three Pillars of Security - Confidentiality, Integrity, and Availability

Day 15 - Back to Hack The Box with "Primed for Action"

Day 14 - My First Hack The Box Challenge - "Evaluative"

Day 13 - Confronting Hard Crypto Challanges in PicoCTF

Day 12 - Leveling Up with picoCTF's Medium Crypto Challenges

Week 2 Session 1 Task - A Deep Dive into ICS/SCADA Security and Attacks

Week 2 Session 2 Task - [Linux Hardening] Information Security Lab: Implementing DAC, MAC, and RBAC

Week 2 Session 3 Task: Dissecting How Brute Force Works with Python

Day 11 - Tackling picoCTF's Easy Crypto Challenges