Analysis of Side-Channel Attack Testing on Talosec Hardware Wallet Part 1

Analysis of Side-Channel Attack Testing on Talosec Hardware Wallet Part 1

This article is a featured article from the Kanxue Forum. Author ID on Kanxue Forum: LunaYoung Talosec Core Team: Wang An, Yang Xiaoya We conducted a security assessment of an open-source hardware wallet using side-channel analysis. This wallet’s chip is based on the ARM-Cortex-M4 core, which uses the Elliptic Curve Digital Signature Algorithm (ECDSA) for … Read more

Hardware Solutions for Privacy Computing: Trusted Execution Environment (TEE)

Hardware Solutions for Privacy Computing: Trusted Execution Environment (TEE)

Machine Heart Column Shenzhen Insight Wisdom Technology Co., Ltd. This article explains and organizes the concept definition and development context of the Trusted Execution Environment (TEE), analyzes the comparison between TEE and cryptographic-based privacy protection technologies, and discusses its application in federated learning, finally introducing the existing frameworks and related applications of TEE. With the … Read more

Comparison of Python Encryption Libraries: Cryptography vs PyCryptodome

Comparison of Python Encryption Libraries: Cryptography vs PyCryptodome

Today, let’s talk about two very important Python encryption libraries: cryptography and pycryptodome. Whether you are developing applications that require encrypted transmission, protecting user privacy, or handling cryptocurrency, both libraries can help you quickly implement encryption and decryption operations. I will guide you through how to use them to encrypt data, generate keys, and even … Read more

Adventures in PyCrypto: Unlocking the Secrets of Data Encryption!

Adventures in PyCrypto: Unlocking the Secrets of Data Encryption!

Hello Adventurers! Today we embark on a mysterious journey to explore the secrets of data encryption! 📝 Mission Briefing Difficulty: ⭐⭐⭐⭐ Objective: Master data encryption skills Estimated Duration: 45 minutes Initial Equipment: Python 3.x Level 1: Beginner Village – Acquiring Basic Equipment 🎯 Beginner Task: Install PyCrypto # Install basic equipment pip install pycryptodome # … Read more

Security of Intelligent Terminals: Hardware Security Technology – Encryption Chips

Security of Intelligent Terminals: Hardware Security Technology - Encryption Chips

Preface After the basic hardware has the capability of independent control, necessary security reinforcement in upper-level applications becomes the main task of terminal security. Among these, hardware encryption work is one of the fundamental tasks for application security reinforcement, and encryption chips are indispensable encryption hardware. In products such as U-shields, smart cards, card readers, … Read more

The Evolution of Cryptographic Algorithms Over 3000 Years

The Evolution of Cryptographic Algorithms Over 3000 Years

This article attempts to discuss the evolution of cryptographic algorithms, which are closely related to our online lives, from ancient to modern times, and to elaborate on the key cryptographic algorithms that emerged throughout this process, leading everyone to understand the fascinating algorithms behind them. — Anhua Jinhui Article Navigation ◈ How Did Ancient People … Read more

Understanding Cryptographic Algorithms: ECC vs RSA

Understanding Cryptographic Algorithms: ECC vs RSA

1. Background According to records, the ancient Greeks invented substitution ciphers around 400 BC. The world’s first telephone secrecy patent appeared in 1881. During World War II, the German military used the “Enigma” cipher machine, and cryptography played a very important role in the war. With the development of information and digital society, people’s awareness … Read more

Concepts Related to Encryption Algorithms in HTTPS

Concepts Related to Encryption Algorithms in HTTPS

Source: http://foofish.net/https-symmetric.html Author: _zhijun Before fully understanding HTTPS, it is necessary to clarify some concepts related to cryptography, such as: plaintext, ciphertext, cipher, key, symmetric encryption, asymmetric encryption, hash, digital signature, and digital certificate. — _zhijun Article Navigation –Cipher05% –Key11% –Plaintext/Ciphertext18% –Symmetric Key22% –Asymmetric Key36% –Digital Signature47% –Digital Certificate67% –References88% Cryptography is widely used in … Read more

Mastering PyCrypto: Secure Your Data with Python

Mastering PyCrypto: Secure Your Data with Python

Click the “Blue Word” to Follow Us Mastering the PyCrypto Library for Enhanced Data Security! When writing code, we often encounter sensitive data that needs to be encrypted for protection. If we talk about the most user-friendly encryption library in Python, it has to be PyCrypto. This tool is like a Swiss Army knife in … Read more

Comprehensive Guide to Cryptography Library in Python

Comprehensive Guide to Cryptography Library in Python

Click the blue words to follow us Beginner: Jing Ge, I’ve been researching data security recently and heard that Python has a great library called cryptography. Can you tell me how to use it? It seems a bit complicated, and I don’t know where to start. Jing Ge: No problem! The cryptography library is indeed … Read more