CategoryCryptography

Perfect Secrecy

P

When dealing with encryption, there is a negligible probability that an attacker will be able to try out all the possible keys used to encrypt the message. Can we make an encryption scheme which will be secure even if attacker has infinite power?

Universally Unique Identifier

U

Almost all the programming languages have a library function for generating a Universally Unique Identifier (UUID). These libraries are responsible for generating an identifier that is unique in the whole universe. How do these libraries go around the complete universe and generate a unique identifier in just a few milliseconds?

Course review: Cryptography-I

C

Cryptography-I is offered by Professor Dan Boneh from Stanford University on the Coursera platform. The course is about the theory and practice of modern cryptography and provides an in-depth view of the field.

Akshay Jain

I am passionate about programming and feel amazing when I see people using the software I have contributed in. I believe it is essential to write high quality code, which is easy to understand and test. I am still a work in progress and decided to document and share some of my learnings with everyone. Apart from that, I like to read books, and so you might find a lot of book reviews on my blog. I am working as a Software Engineer at Oracle since post-graduation from IISc Bangalore, and happily married :)

Get in touch