Fermat’s Little Theorem states that ap – a is divisible without remainder if p is a prime, and a is … More
Category: Cryptography
The Math Behind RSA Algorithm
RSA is still the most common public key algorithm in cryptography world. Even though, applying the algorithm is very easy, … More
Unofficial Guide to Fermat’s Little Theorem
Fermat contributes construction of modern math with well known theorems. Today, we are going to mention the little one. This is … More
A Step By Step Bitcoin Address Example
A money transfer transaction must include sender and receiver account information and transaction amount. On the other hand, a bitcoin … More
Solving Elliptic Curve Discrete Logarithm Problem
Elliptic curve cryptography is powerful. Calculating public key from known private key and base point can be handled easily. On … More
Counting Points on Elliptic Curves over Finite Field: Order of Elliptic Curve Group
ECDSA enables to produce signatures faster. Besides, its both signatures and keys are much smaller than adopted alternative options offering … More
Elegant Signatures with Elliptic Curve Cryptography
Elegance is the only beauty that never fades. This is a loving Audrey Hepburn quote. I struggle to adapt this … More
New Generation Cryptocurrency
The British newspaper announced that a man who bought 27$ of bitcoin in 2009 would recall this investment in 2013 … More
Signing Contents Digitally: An Email Implementation
“I was happy when I design my own signature. Also, deciding to put my signature under this job makes me … More
Exchanging Encrypted Mails
2016 released Snowden is a biographical movie fictionalised life story of Former NSA employee Edward Snowden. The movie reveals illegal surveillance techniques of the government organization. Also, … More