Biar (biar)

Biar

Founder of arfdao FHE

1 Followers

Recent casts

Top casts

In fact, you encounter these concepts daily: ‎•WhatsApp shows “end-to-end encryption” when you open a chat. ‎•When you enter a store, your data is encrypted. ‎•Even your passwords are stored in encrypted data repositories. ‎So, let’s go step by step through encryption methods. Starting with symmetric encryption. ‎Symmetric Encryption ‎In symmetric encryption, the same key is used both to encrypt data and to decrypt it again. ‎This method can be advantageous because it’s fast. However, it has vulnerabilities, mainly around key distribution. Safely sending the key to the other party can be just as challenging as transmitting the encrypted message itself. ‎The key idea here: there is only one key, and it must be securely delivered to the person you want to access the message.

  • 1 reply
  • 0 recasts
  • 0 reactions

Asymmetric Encryption ‎This method involves two keys: ‎•a public key (open to everyone), and ‎•a private/secret key (known only by the owner). ‎Let’s say person A wants to exchange information with person B. ‎•A has a private key that only they know. ‎•A also has a public key that everyone, including A, knows. ‎Here’s one approach: ‎•A encrypts their message using their private key and sends it to B. ‎•Since B does not have A’s private key, they use A’s public key to decrypt it.

  • 1 reply
  • 0 recasts
  • 0 reactions

Moving on to FHE 🤯 ‎So far, we’ve been talking about encrypting a message and then decrypting it. But now let’s talk about using an encrypted message without ever decrypting it—this is FHE, or Fully Homomorphic Encryption (in Turkish: Tam Homomorfik Şifreleme). ‎In 2009, Craig Gentry published a paper demonstrating that encrypted data could be used directly, without needing decryption.

  • 0 replies
  • 0 recasts
  • 0 reactions

Onchain profile

Ethereum addresses