Skip to main content

Featured post

Python Top Libraries You Need to Create ML Model

Creating a Model of Machine Learning in Python, you need two libraries. One is 'NUMPY' and the other one is 'PANDA'.

For this project, we are using Python Libraries to Create a Model.
What Are Key Libraries You Need I have explained in the below steps. You need Two.
NUMPY - It has the capabilities of CalculationsPANDA - It has the capabilities of Data processing. To Build a model of Machine learning you need the right kind of data. So, to use data for your project, the Data should be refined. Else, it will not give accurate results. Data AnalysisData Pre-processing How to Import Libraries in Pythonimportnumpy as np # linear algebra
importpandas as pd # data processing, CSV file I/O (e.g. pd.read_csv)

How to Check NUMPY/Pandas installed After '.' you need to give double underscore on both the sides of version. 
How Many Types of Data You Need You need two types of data. One is data to build a model and the other one is data you need to test the model. Data to build…

8 Popular Encryption methods real Usage

The process of replacing original data with special-characters is called an Encryption. A highly secured server handles the encryption and Decryption. You need a private key to decrypt the data. Else, you cannot decrypt the data.

Private keys are two types. Sender uses one private key and receiver uses one other private key.

I have given in this post about 8 encryption methods.

Flow Diagram of Encryption

image courtesy by

 Different Encryption Methods

  1. Classic Cipher
  2. Random Key Generation
  3. RSA Token
  4. Hash Functions
  5. Mac value - Message Authentication code
  6. Key Hash
  7. TLS Protocol
  8. Authenticated Cipher

 1. Classic Cipher

The best example is this kind of algorithm was used in world war -II communication machines.

2. Random Key Generations

One kind of security. They use an algorithm that sends random numbers. People use that number as a password.

3. RSA Token

Every 60 seconds a token is generated. Mostly people use for financial applications. An extra identity mechanism along with user id and password.

4. Hash Functions

It assigns a hash value for each input data value. So that third person cannot map to original data. The hash value is either 256 or 512 bits.

5. MAC Value

It is also called message authentication value. It takes 3 types of input.

6. Key Hash

Key hash is little different than Hash Function. In the case of Hash function, the reverse calculation of 256 or 512 bits give a clue to original data. So possibility of hacking you can find in Hash functions.

So Key Hash came into picture. The data first go through a MAC algorithm, where it creates Tag called MAC tag. So in Key Hash process one additional data transmitted that is called MAC Tag.

One more mechanism is Pseudorandom Functions also called PRFs. Where it calculates random key.

7. TLS Protocol

TLS is a transport layer security protocol(TLS). It works basically as a internet security layer. This works as middle layer between Server and Website.

8. Authenticated Cipher

In this case, both encryption, MAC tag help to check the authenticity of data or transactions.

Related Posts


Most Viewed

Hyperledger Fabric Real Interview Questions Read Today

I am practicing Hyperledger. This is one of the top listed blockchains. This architecture follows R3 Corda specifications. Sharing the interview questions with you that I have prepared for my interview.

Though Ethereum leads in the real-time applications. The latest Hyperledger version is now ready for production applications. It has now become stable for production applications.
The Hyperledger now backed by IBM. But, it is still an open source. These interview questions help you to read quickly. The below set of interview questions help you like a tutorial on Hyperledger fabric. Hyperledger Fabric Interview Questions1). What are Nodes?
In Hyperledger the communication entities are called Nodes.

2). What are the three different types of Nodes?
- Client Node
- Peer Node
- Order Node
The Client node initiates transactions. The peer node commits the transaction. The order node guarantees the delivery.

3). What is Channel?
A channel in Hyperledger is the subnet of the main blockchain. You c…