Tagged articles
4 articles
Page 1 of 1
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2022 · Information Security

Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues

This article explains the fundamentals of symmetric, asymmetric, and hybrid encryption, compares their strengths and weaknesses, discusses key distribution challenges, and illustrates how combining both methods can address security gaps while highlighting potential man‑in‑the‑middle attacks.

Hybrid Encryptionasymmetric encryptioninformation security
0 likes · 7 min read
Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues
ITPUB
ITPUB
Aug 18, 2020 · Backend Development

Do Consistent Hashes Really Keep Your Cluster Balanced? Real-World Tests and Fixes

This article experimentally validates consistent hashing by adding and removing nodes in a 5‑node cluster, reveals key distribution imbalance and avalanche risks, and proposes solutions such as node scaling and virtual node virtualization, complete with Python code examples and detailed analysis.

Node Scalingconsistent hashingkey distribution
0 likes · 19 min read
Do Consistent Hashes Really Keep Your Cluster Balanced? Real-World Tests and Fixes
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications

This article explains the fundamentals of cryptography, covering symmetric and asymmetric encryption, key distribution challenges and solutions, digital signatures, certificates, and practical applications such as SSH login, HTTPS handshakes, and API authentication, providing clear examples and code snippets.

asymmetric encryptioncryptographydigital signature
0 likes · 17 min read
Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications
21CTO
21CTO
Nov 10, 2017 · Information Security

Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained

This article explains the fundamentals of symmetric and asymmetric encryption, the key distribution challenges they face, how hybrid cryptosystems combine their strengths, and introduces essential cryptographic tools such as hash functions, message authentication codes, digital signatures, and public‑key certificates, comparing their capabilities.

CertificateMacdigital signature
0 likes · 15 min read
Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained