Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
Data Encryption : A Powerful and an Approachable Technology! Sai Natkar
Encryption is the process of changing information in a way as to make it unreadable by anyone except those possessing special knowledge that allows them to change the information back to its original, readable form. Encryption is important because it allows us to protect data that we don’t want anyone else to have access to.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Review on variants of Security aware AODVijsrd.com
Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.
Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
Data Encryption : A Powerful and an Approachable Technology! Sai Natkar
Encryption is the process of changing information in a way as to make it unreadable by anyone except those possessing special knowledge that allows them to change the information back to its original, readable form. Encryption is important because it allows us to protect data that we don’t want anyone else to have access to.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Review on variants of Security aware AODVijsrd.com
Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
Learn what is Asymmetric Encryption and how asymmetric encryption works with examples. Also, demystify the difference between asymmetric vs symmetric encryption.
A Study of Different Partitioning Clustering Techniqueijsrd.com
In the field of software, Data mining is very useful to identify the interesting patterns and trends from the large amount of stored data into different database and data repository. Clustering technique is basically used to extract the unknown pattern from the large set of data for electronic stored data, business and real time applications. Clustering is a division of data into different groups. Data are grouped into clusters with high intra group similarity and low inter group similarity [2]. Clustering is an unsupervised learning technique. Clustering is useful technique that applied into many areas like marketing studies, DNA analysis, text mining and web documents classification. In the large database, the clustering task is very complex with many attributes. There are many methods to deal with these problems. In this paper we discuss about the different Partitioning Based Methods like- K-Means, K-Medoids and Fuzzy K-Means and compare the advantages or disadvantages over these techniques.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxmydrynan
Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
This is the lecture material that was provided.
Cryptography and Telecommunications
Cryptography
|
Telecommunications and Firewalls
Cryptography
Back to Top
The History of Cryptography
It must be that as soon as a culture has reached a certain level, probably measured largely by its literacy, cryptography appears spontaneously--as its parents, language, and writing probably also did. The multiple human needs and desires that demand privacy among two or more people in the midst of social life must inevitably lead to cryptology wherever men thrive and wherever they write (Kahn, 1996, p. 84).
Kahn, D.
The codebreakers: The comprehensive history of secret communication from ancient times to the internet
. New York, NY: Scribner.
Cryptography:
Cryptography is a discipline that embodies principles and methods for the transformation of data to hide its meaning, establish its authenticity; and prevent its undetected modification, repudiation, and unauthorized use. Cryptography is an old art. We know that the ancient Egyptians were using cryptographic techniques in 1900 B.C. The oldest known example is on the tomb of the Egyptian nobleman Khnumhotep II. For more of this history, you might find a tour of the National Security Agency's National Cryptologic Museum interesting, but this is not required for this class. The National Cryptologic Museum tour can be accessed at the following link:
National Cryptologic Museum
Forms of cryptography:
There are two basic forms of cryptography:
secret-key cryptography
and
public-key cryptography
. These forms of cryptography are different because they use
cryptographic keys
in different ways.
Secret-key cryptography:
Secret key cryptography is the original form of cryptography. Let us deal with text at this point, and think of text as a string of characters. An understandable string of characters is called a
plaintext
. If we have a plaintext and we want to hide its meaning, there are basically two things we can do: We can rearrange the letters in the plaintext, or we can substitute the letters in the plaintext with other letters. These are the two forms of
secret writing
. They are called
transposition
and
substitution
methods, respectively. The text that results from encryption, which is the application of cryptography, is called the
ciphertext
.
Type of Cryptography
Plaintext
Method
Ciphertext
Transposition
cryptography
rea.
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
Learn what is Asymmetric Encryption and how asymmetric encryption works with examples. Also, demystify the difference between asymmetric vs symmetric encryption.
A Study of Different Partitioning Clustering Techniqueijsrd.com
In the field of software, Data mining is very useful to identify the interesting patterns and trends from the large amount of stored data into different database and data repository. Clustering technique is basically used to extract the unknown pattern from the large set of data for electronic stored data, business and real time applications. Clustering is a division of data into different groups. Data are grouped into clusters with high intra group similarity and low inter group similarity [2]. Clustering is an unsupervised learning technique. Clustering is useful technique that applied into many areas like marketing studies, DNA analysis, text mining and web documents classification. In the large database, the clustering task is very complex with many attributes. There are many methods to deal with these problems. In this paper we discuss about the different Partitioning Based Methods like- K-Means, K-Medoids and Fuzzy K-Means and compare the advantages or disadvantages over these techniques.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxmydrynan
Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
This is the lecture material that was provided.
Cryptography and Telecommunications
Cryptography
|
Telecommunications and Firewalls
Cryptography
Back to Top
The History of Cryptography
It must be that as soon as a culture has reached a certain level, probably measured largely by its literacy, cryptography appears spontaneously--as its parents, language, and writing probably also did. The multiple human needs and desires that demand privacy among two or more people in the midst of social life must inevitably lead to cryptology wherever men thrive and wherever they write (Kahn, 1996, p. 84).
Kahn, D.
The codebreakers: The comprehensive history of secret communication from ancient times to the internet
. New York, NY: Scribner.
Cryptography:
Cryptography is a discipline that embodies principles and methods for the transformation of data to hide its meaning, establish its authenticity; and prevent its undetected modification, repudiation, and unauthorized use. Cryptography is an old art. We know that the ancient Egyptians were using cryptographic techniques in 1900 B.C. The oldest known example is on the tomb of the Egyptian nobleman Khnumhotep II. For more of this history, you might find a tour of the National Security Agency's National Cryptologic Museum interesting, but this is not required for this class. The National Cryptologic Museum tour can be accessed at the following link:
National Cryptologic Museum
Forms of cryptography:
There are two basic forms of cryptography:
secret-key cryptography
and
public-key cryptography
. These forms of cryptography are different because they use
cryptographic keys
in different ways.
Secret-key cryptography:
Secret key cryptography is the original form of cryptography. Let us deal with text at this point, and think of text as a string of characters. An understandable string of characters is called a
plaintext
. If we have a plaintext and we want to hide its meaning, there are basically two things we can do: We can rearrange the letters in the plaintext, or we can substitute the letters in the plaintext with other letters. These are the two forms of
secret writing
. They are called
transposition
and
substitution
methods, respectively. The text that results from encryption, which is the application of cryptography, is called the
ciphertext
.
Type of Cryptography
Plaintext
Method
Ciphertext
Transposition
cryptography
rea.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cryptography and Symmetric Key Algorithms
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
OR
The art of creating and implementing secret codes and ciphers is known as cryptography.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...pchutichetpong
M Capital Group (“MCG”) expects to see demand and the changing evolution of supply, facilitated through institutional investment rotation out of offices and into work from home (“WFH”), while the ever-expanding need for data storage as global internet usage expands, with experts predicting 5.3 billion users by 2023. These market factors will be underpinned by technological changes, such as progressing cloud services and edge sites, allowing the industry to see strong expected annual growth of 13% over the next 4 years.
Whilst competitive headwinds remain, represented through the recent second bankruptcy filing of Sungard, which blames “COVID-19 and other macroeconomic trends including delayed customer spending decisions, insourcing and reductions in IT spending, energy inflation and reduction in demand for certain services”, the industry has seen key adjustments, where MCG believes that engineering cost management and technological innovation will be paramount to success.
MCG reports that the more favorable market conditions expected over the next few years, helped by the winding down of pandemic restrictions and a hybrid working environment will be driving market momentum forward. The continuous injection of capital by alternative investment firms, as well as the growing infrastructural investment from cloud service providers and social media companies, whose revenues are expected to grow over 3.6x larger by value in 2026, will likely help propel center provision and innovation. These factors paint a promising picture for the industry players that offset rising input costs and adapt to new technologies.
According to M Capital Group: “Specifically, the long-term cost-saving opportunities available from the rise of remote managing will likely aid value growth for the industry. Through margin optimization and further availability of capital for reinvestment, strong players will maintain their competitive foothold, while weaker players exit the market to balance supply and demand.”
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
1. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.1
Cryptography Unchained
Cryptography
Unchained
10 min
2. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.2
Cryptography Unchained
In a world where the flow of information is
increasing exponentially, it becomes essential to have
powerful tools to ensure security features in terms of
data exchange and storage (such as authenticity,
integrity, confidentiality…). Among the available tools,
the "BlockChain" focuses today all the attention and
passions.
As a particularly complex mathematical
construction, and a subject of many articles and books,
BlockChain could deeply transform many sectors and
appears as an essential component of the development
of tomorrow’s communication network. Its "basic
bricks" are quite old and belong to the vast and
fascinating field of cryptography. In this article, we
propose to go back to the roots and explore this
science of secrecy.
Very early in the development of its energy
intelligence & automation solution, our company
BeeBryte got interested in the cryptographic processes
and technologies that lay the foundations of the
security of any information system (confidentiality,
authenticity and integrity). Used separately or in
combination, these technologies are already largely
integrated into our SaaS, especially to protect
communications between our IoT gateway (Box) and
our Cloud-based platform against cyber-attacks.
Cryptography is a discipline that aims at
protecting the integrity and authenticity of a message
as well as its privacy from third-party intrusions. Used
in a vast range of areas, cryptography covers many
features, on top of which the secure transmission of
data (encryption), the generation of secrets between
users, the authentication (or signature) of a message,
and even its protection against any alteration.
Our wish here is to present some functional
components, which are essential to the
implementation of cryptographic protocols, such as
those underlying the BlockChain.
We will not go into detail about the complex
mathematical theories underpinning the exposed
tools. Globally, they rely on operations, which are
relatively simple to perform but extremely difficult to
reverse, except resorting to "brute force", i.e. the
systematic exploration of wide combinations, limited
by the available computing power. We invite the
reader interested in exploring the underlying
mathematics to further his searches on his own.
KEY CONCEPTS
Symmetric Encryption – AES algorithm
Symmetric encryption’s basic concept relies on
the sharing of a common key between interlocutors.
This key is used by the sender to encrypt his message,
which can only be decrypted by using this same key,
that only the recipient and the sender of the message
are familiar with.
The encryption algorithm makes it possible to
transform plain text into blocks which remain
incomprehensible without the key. However, these
algorithms have the major disadvantage of requiring
the prior – confidential – sharing of a common key. This
drawback can however be overcome with the help of
techniques such as the Diffie-Hellman key exchange
protocol.
The most commonly used symmetric
encryption algorithm is the Advanced Encryption
Standard (AES), notably adopted by the NSA in the
United States. This algorithm defines a number of
transformations dedicated to be carried out on data
stored in a table. The length of the key (128, 192 or
256-bit) determines the strength of the encryption.
Illustration of a typical use case:
Bob wants to send a message to Alice, with whom
he shares a secret that they will use as the
3. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.3
Cryptography Unchained
encryption key. They take good care not to
communicate this key to any other third party.
Bob encrypts the message using the encryption key,
and then sends the encrypted message to Alice.
By also using the encryption key, Alice is able to
decrypt the message she receives, and accesses
successfully to the initial message from Bob.
Asymmetric encryption - RSA Algorithm
In asymmetric encryption, each user has a pair
of keys: a public key, broadcasted to all users, and a
private key known only to him. Each message
encrypted by one of the two keys can only be
decrypted with the other key constituting the pair.
Because of the high computational complexity
of symmetric encryption algorithms, they are typically
used to encrypt small amounts of data. The asymmetric
encryption is mainly used in 2 situations:
To certify the identity of the message sender
Let’s consider the case where Bob wants to
transmit a message and ensures to the recipient
that he is the author. By encrypting the message
with his private key, Bob creates a digital signature
that is specific to him. Anyone can decipher his
message using Bob’s public key and thus confirm
that the message is from Bob. Indeed, the use of
another public key would return a wrong message.
To send protected content to a specific recipient
This time, Bob wants to send a message to
Alice while ensuring that she will be the only one
able to read it. By encrypting his message with the
public key of Alice, Bob ensures that only Alice, the
unique holder of the associated private key, will
decrypt and read it.
Hash Functions
In cryptography, hash functions are
mathematical functions that take as input any type of
data and generate a code (the hash) of fixed length,
representative of the input data.
A hash function has several unique properties
that make it a useful tool for diverse applications in
computer security:
It is deterministic: for a given input value, the hash
function will always return the same output.
Therefore, the hash can be seen as a signature of
fixed size of a message… but a non-exclusive
signature.
In fact, several different messages can have the
same hash, but the probability of collisions (i.e. the
probability that two different messages have the
same hash) is extremely low.
This property allows you to authenticate a message:
if one knows the hash (or signature) of a message
and that it receives independently a copy of this
message, after calculation of its hash and positive
comparison with the signature, the authenticity of
the received message is quasi certain.
A hash function is generally very sensitive to initial
conditions: the slightest modification of the content
input produces a totally different hash. This
property allows – in addition to authentication – to
ensure the integrity of a message, since the smallest
alteration will dramatically invalid its hash.
4. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.4
Cryptography Unchained
It is not directly invertible: calculating the hash
corresponding to a given message is easy, but the
opposite way, that is: to find a message that
corresponds to a hash, is not possible by any direct
calculation. The only solution is to ‘chop’ or hash, in
a systematic way, different messages until falling on
the expected hash, this method being physically
limited by available computing capacity.
Illustration of a typical use case:
Bob wants to send a message to Alice and wants to
ensure that the content of his message is not
altered during the transmission.
Alice, on the other hand, wants to ensure that the
message she receives is exactly what Bob wanted
to send her.
Bob hashes the message that he wants to send to
Alice. He sends his message as well as the
corresponding hash.
When she receives the message, Alice reads the
plain text message from Bob, and hashes it on her
side. By comparing this hash to the hash Bob
transmitted, she is able to determine whether or
not the message she just read has been corrupted
during the transmission.
Conclusion
The few elementary cryptographic techniques
that we have outlined in this article constitute the basic
components from which are developed more complex
systems such as the BlockChain but can (and must) also
be considered individually as means to address a large
number of features for securing data.
This perspective appeared to us as essential to
further dispassionately discuss the potential
applications of the BlockChain to the energy sector,
with their strengths and potentials but also their
constraints and relevance limits.
BeeBryte is using IoT, AI and BlockChain to get
commercial buildings, factories, EV charging stations or
entire eco-suburbs to consume electricity in a smarter,
more efficient and cheaper way while reducing carbon
footprint! BeeBryte is based in France and Singapore,
and is accelerated by Intel & TechFounders. Since its
creation in 2015, BeeBryte's solutions have been
awarded by prestigious organizations, such as EDF
Pulse, DENA Start-up Energy Transition award & Hello
Tomorrow Challenge.
If you want to participate in the energy revolution,
please contact us at:
contact@beebryte.com
www.twitter.com/BeeBryteGroup
www.beebryte.com