Sassafras Consensus Protocol

2023-09-06 | #consensus #cryptography #distributed-systems

Sassafras is a novel consensus protocol designed to address the recurring fork-related challenges encountered in other lottery-based protocols. The protocol aims to create a mapping between each epoch’s slots and the validators set while ensuring that the identity of validators assigned to the slots remains undisclosed until the slot is actively claimed during block production.

Continue reading 


Cyclic Groups

2023-08-23 | #cryptography #number-theory

A cyclic group is a type of algebraic structure in abstract algebra which definition is based on the concept of a group and group generators. Cyclic groups provide the mathematical foundation for many cryptographic protocols and schemes.

Continue reading 


Journey to Zero-Knowledge

2023-08-06 | #cryptography #mathematics #zk-proof

Article download Introduction Zero-Knowledge Proofs (ZKP) represent a fascinating and influential concept within the realm of cryptographic protocols. At a glance, a ZKP enables one party to demonstrate the correctness of a statement to another party without revealing any details beside the validity of the claim itself.

Continue reading 


Compression Codes

2023-07-23 | #codes

Codes Introduction Given a finite alphabet X a code for X is a function: c: X → {0,1}* We can extend the code to arbitrary strings with symbols in X as:

Continue reading 


Birthday Paradox

2023-03-29 | #cryptography #probability

The birthday paradox is a surprising statistical phenomenon that shows how even in a small group, it’s very likely that two people share the same birthday. In this blog post, we’ll explore the math behind the paradox and its practical applications in computer science and cryptography.

Continue reading 


Discrete Logarithm

2023-03-29 | #cryptography #number-theory

Discrete logarithm is a fundamental concept in modern cryptography, with numerous applications in key exchange, digital signatures, and other cryptographic protocols. This post explores the basics of discrete logarithm, some important cryptographic protocols derived from it and the most important attacks.

Continue reading 


Random Primes Generation

2023-01-16 | #cryptography #number-theory

Generating random primes and testing their primality is essential for many cryptographic algorithms. In this post, we’ll explore methods for generating and testing prime numbers. What is this about We want to develop an algorithm that generates a prime in the range [2ᵏ⁻¹, 2ᵏ-1], with k the number of bits required to represent the prime.

Continue reading 


Linux Workstation Tools

2022-12-18 | #system #tooling

Discovering the right tools can significantly improve your productivity and user experience on any operating system. In this post, I’ll share some of my go-to tools that I personally use on my workstation to enhance my workflow.

Continue reading 


Timing Attack

2022-04-23 | #cryptography #security

Variance Recap The variance of an aleatory variable X is a statistical measure of the spread (or dispersion) of a set of values for a random variable. Variance is defined as the squared deviations of the values from the mean.

Continue reading 