Skip to main content

Featured post

5 Real Digital Skills You need to Perfrom your Job

Understand...Understand before you move further on why many people talking about Digital Skills. I have listed out the real Digital skills that you need to perform your job.

1. Automation of Repeated Tasks Take the best example of saving all the emails from google account. That is after sending an email that should save in an Excel document.

This is one kind of Skill. So learning technologiesto create Tools for this kind of automation provide you a lot of job opportunities.

2. Stop Certain activity Using Help of Technology For example, work and home both are different. After certain hours the access to the Company network should be stopped.

So that you can focus on your Home duties. Here you should have tools to do this kind of activity.

3.  Handling Data in New Age Smart Phone World How to present data in a user-friendly way is the topmost digital skill. Nowadays there are many tools present. The Best example is Tableau. You can present the data in a user-friendly way.

4. Making Les…

8 Popular Encryption methods real Usage

The process of replacing original data with special-characters is called an Encryption. A highly secured server handles the encryption and Decryption. You need a private key to decrypt the data. Else, you cannot decrypt the data.

Private keys are two types. Sender uses one private key and receiver uses one other private key.

I have given in this post about 8 encryption methods.

Flow Diagram of Encryption

image courtesy by

 Different Encryption Methods

  1. Classic Cipher
  2. Random Key Generation
  3. RSA Token
  4. Hash Functions
  5. Mac value - Message Authentication code
  6. Key Hash
  7. TLS Protocol
  8. Authenticated Cipher

 1. Classic Cipher

The best example is this kind of algorithm was used in world war -II communication machines.

2. Random Key Generations

One kind of security. They use an algorithm that sends random numbers. People use that number as a password.

3. RSA Token

Every 60 seconds a token is generated. Mostly people use for financial applications. An extra identity mechanism along with user id and password.

4. Hash Functions

It assigns a hash value for each input data value. So that third person cannot map to original data. The hash value is either 256 or 512 bits.

5. MAC Value

It is also called message authentication value. It takes 3 types of input.

6. Key Hash

Key hash is little different than Hash Function. In the case of Hash function, the reverse calculation of 256 or 512 bits give a clue to original data. So possibility of hacking you can find in Hash functions.

So Key Hash came into picture. The data first go through a MAC algorithm, where it creates Tag called MAC tag. So in Key Hash process one additional data transmitted that is called MAC Tag.

One more mechanism is Pseudorandom Functions also called PRFs. Where it calculates random key.

7. TLS Protocol

TLS is a transport layer security protocol(TLS). It works basically as a internet security layer. This works as middle layer between Server and Website.

8. Authenticated Cipher

In this case, both encryption, MAC tag help to check the authenticity of data or transactions.

Related Posts


Most Viewed

Hyperledger Fabric Real Interview Questions Read Today

I am practicing Hyperledger. This is one of the top listed blockchains. This architecture follows R3 Corda specifications. Sharing the interview questions with you that I have prepared for my interview.

Though Ethereum leads in the real-time applications. The latest Hyperledger version is now ready for production applications. It has now become stable for production applications.
The Hyperledger now backed by IBM. But, it is still an open source. These interview questions help you to read quickly. The below set of interview questions help you like a tutorial on Hyperledger fabric. Hyperledger Fabric Interview Questions1). What are Nodes?
In Hyperledger the communication entities are called Nodes.

2). What are the three different types of Nodes?
- Client Node
- Peer Node
- Order Node
The Client node initiates transactions. The peer node commits the transaction. The order node guarantees the delivery.

3). What is Channel?
A channel in Hyperledger is the subnet of the main blockchain. You c…