Hash

|

Understanding TPM 2.0 and Platform Configuration Registers (PCRs)

The Trusted Platform Module (TPM) 2.0 is a hardware-based security feature designed to enhance the integrity and security of computing systems. It is an international standard defined by the Trusted Computing Group (TCG) and is implemented as a dedicated chip or firmware module on a computer’s motherboard. The TPM provides cryptographic functions, secure storage, and…

| | |

Proving Ownership of BTC Multisig Addresses

Proving ownership of a Bitcoin (BTC) address is a crucial aspect in various scenarios. The post Proof of Ownership for BTC Addresses introduced the proof for non-multisig addresses. This guide explores how to prove ownership for different multisig BTC address types, including algorithm specifications and step-by-step methods. What is a Multisig Address? A Bitcoin multisig…

| | |

Proof of Ownership for BTC Addresses: A Detailed Guide

Proving ownership of a Bitcoin (BTC) address is a crucial aspect in various scenarios, such as verifying identity in a transaction or demonstrating holdings without revealing private keys. This guide explores how to prove ownership for different BTC address types, including algorithm specifications and step-by-step methods. BTC Address Types P2PKH (Pay-to-Public-Key-Hash) P2SH (Pay-to-Script-Hash) P2WPKH (Pay-to-Witness-Public-Key-Hash)…

| |

A Comprehensive Guide to PGP: Technical Deep Dive

Pretty Good Privacy (PGP) is a robust encryption program that ensures privacy and authentication for data communication. Developed by Phil Zimmermann in 1991, it’s widely used for securing emails, files, and directories. This article explores the technical details of PGP, including its algorithms, key management, and detailed processes for encryption, decryption, and signing. Cryptographic Foundations…

51% Attack 101

One of the most significant threats to public blockchain networks is a 51% attack, where a single entity gains control over the majority of the network’s mining power. In this blog post, we will discuss the concept of a 51% attack, its potential consequences, and measures to prevent it. What is a 51% Attack? A…

Cryptographic Hash 101

A cryptographic hash function is a hash function that satisfies the properties of pre-image resistance, second pre-image resistance and collision resistance. Here, a hash function is a mathematical algorithm that maps data of an arbitrary size (or “message”) to a bit array of a fixed size (the “hash value”, “hash”, or “message digest”), that is,…

Bitcoin 101

Bitcoin is the world’s first cryptocurrency on the Bitcoin blockchain network. BTC has gained significant popularity since its inception in 2009. It functions as a decentralized, peer-to-peer electronic cash system, allowing users to make transactions without the need for a central authority. Bitcoin History Bitcoin’s story begins with the release of a whitepaper by an…

Blockchain 101

What is blockchain? Blockchain is a specific type of database with special data organization and properties. Blockchains store data in blocks that are then cryptographically chained together in the chronological order one by one, with the block chained onto the previous block. Data commonly stored in blockchains are transactions for Distributed Ledgers. The transactions are…

|

Linux Kernel 4.19.70 Release

This post summarizes new features, bugfixes and changes in Linux kernel release 4.19.70. Linux 4.19.70 Release contains 95 changes, patches or new features. In total, there are 101,521 lines of Linux source code changed/added in Linux 4.19.70 release compared to Linux 4.19 release. To view the source code of Linux 4.19.70 kernel release online, please…

How to pass results from the opened window to the openning window in JavaScript?

From the opening window by JavaScript window.open(), we can pass info to the opened by hash. But how to pass results back from the opened window to the openning window in JavaScript? Assume in the opener window, a JavaScript variable is defined like var exchangeVar = ”; In the opened window, you can update the…

How to get the git commit tree?

How to get a tree-like view of the git commit history? My favorite command line: git log –graph –oneline It will prints a text based graph like (with colors): * b5dc8b9 Merge branch ‘master’ of https://github.com/layerzero/libi0 | | * 7514ef1 revised the README.md a little bit | * 6692428 align size to page for both…

| |

Building and Installing Linux Kernel from the Source Code in an Existing Linux OS

Building Linux kernel may sound a complex and geek-only thing. However, as Linux kernel itself has much less depended tools/packages compared to other software packages, it is quite easy to compile, build and install a Linux kernel from the source code in an existing Linux OS. Building Linux kernel is needed if you need to…

Hashing Library for C

I try to find some Hashing libraries for C and find several good ones. The hsearch function in the GNU C library. There are other methods to organize information which later should be searched. The costs of insert, delete and search differ. One possible implementation is using hashing tables. The following functions are declared in…