Skip to main content

Featured post

Python For Loop increment Tricky Example

In this post, I have explained tricky for loop example in Python. The usage of FOR LOOP is to create loops. How many times the loop will execute you may supply in the input.

My Project is to get each character from the input String. I use for loop to achieve this.
Tricky FOR LOOP Examples Explained different for loop examples.
1. Python For Loop Syntax using Variable or Array >> for valuein variable
Python For Loop Example >> myName = 'srinimf'

>> for valuein myName
...        print(value)

The result is as follows:
s
r
i
n
i
m
f
2. Python For Loop With '1' to '10' or 'n'for(i=1;i<=10;i++)<loopbody> The above for loop useful to create definite loop. The maximum loops are '10'. You can write your logic for each value in Python.

This is one of the tricky and most popular example.
3. How does a Python For Loop works a Flowchart

The 'letter' contains ValuestateName is an Array or VariableAfter For Loop you can use BODY s…

8 Popular Encryption methods real Usage

The process of replacing original data with special-characters is called an Encryption. A highly secured server handles the encryption and Decryption. You need a private key to decrypt the data. Else, you cannot decrypt the data.

Private keys are two types. Sender uses one private key and receiver uses one other private key.

I have given in this post about 8 encryption methods.

Flow Diagram of Encryption


encryption
image courtesy by digit.in

 Different Encryption Methods

  1. Classic Cipher
  2. Random Key Generation
  3. RSA Token
  4. Hash Functions
  5. Mac value - Message Authentication code
  6. Key Hash
  7. TLS Protocol
  8. Authenticated Cipher

 1. Classic Cipher

The best example is this kind of algorithm was used in world war -II communication machines.

2. Random Key Generations

One kind of security. They use an algorithm that sends random numbers. People use that number as a password.

3. RSA Token

Every 60 seconds a token is generated. Mostly people use for financial applications. An extra identity mechanism along with user id and password.

4. Hash Functions

It assigns a hash value for each input data value. So that third person cannot map to original data. The hash value is either 256 or 512 bits.

5. MAC Value

It is also called message authentication value. It takes 3 types of input.

6. Key Hash

Key hash is little different than Hash Function. In the case of Hash function, the reverse calculation of 256 or 512 bits give a clue to original data. So possibility of hacking you can find in Hash functions.

So Key Hash came into picture. The data first go through a MAC algorithm, where it creates Tag called MAC tag. So in Key Hash process one additional data transmitted that is called MAC Tag.

One more mechanism is Pseudorandom Functions also called PRFs. Where it calculates random key.

7. TLS Protocol

TLS is a transport layer security protocol(TLS). It works basically as a internet security layer. This works as middle layer between Server and Website.

8. Authenticated Cipher

In this case, both encryption, MAC tag help to check the authenticity of data or transactions.

Related Posts

Comments

Most Viewed

Hyperledger Fabric Real Interview Questions Read Today

I am practicing Hyperledger. This is one of the top listed blockchains. This architecture follows R3 Corda specifications. Sharing the interview questions with you that I have prepared for my interview.

Though Ethereum leads in the real-time applications. The latest Hyperledger version is now ready for production applications. It has now become stable for production applications.
The Hyperledger now backed by IBM. But, it is still an open source. These interview questions help you to read quickly. The below set of interview questions help you like a tutorial on Hyperledger fabric. Hyperledger Fabric Interview Questions1). What are Nodes?
In Hyperledger the communication entities are called Nodes.

2). What are the three different types of Nodes?
- Client Node
- Peer Node
- Order Node
The Client node initiates transactions. The peer node commits the transaction. The order node guarantees the delivery.

3). What is Channel?
A channel in Hyperledger is the subnet of the main blockchain. You c…