Prøve GULL - Gratis
SageMath: One Last Tango with Cybersecurity
Open Source For You
|January 2026
In the previous article in this series (published in the November 2025 issue of OSFY), we had a detailed discussion on secure key exchange and how the Diffie-Hellman key exchange scheme can be implemented using SageMath. As promised, in this article we will discuss digital signatures, hashing, and message authentication.
-
Let's begin by trying to have a theoretical understanding of the concepts of digital signatures, hashing and message authentication.
In the previous article, we looked at a practical situation where a digital signature becomes essential—when your friend emails you agreeing to lend ₹1 million and later denies ever sending the message. A digital signature is a mathematical technique used to verify the authenticity and integrity of digital messages or documents. When a message carries a valid digital signature, the recipient can be confident that it was indeed sent by the claimed sender and has not been tampered with. An added advantage is that a properly generated digital signature is far more trustworthy than a handwritten signature, since it is backed by strong cryptographic guarantees. Digital signatures can be created using various cryptographic algorithms such as RSA, DSA, and ECDSA, each offering different security properties and performance characteristics.
Hashing is a fundamental technique in cryptography that transforms an input message of any length into a fixed-size string of characters, called a hash value (informally called hash) or message digest (informally called digest). A good hash function is designed to be fast to compute while being practically impossible to reverse, meaning the original message cannot be reconstructed from its hash value. It also ensures that even a small change in the input—such as altering a single character—produces a completely different hash, a property known as the avalanche effect. Examples for hash functions include SHA-256, SHA-384, SHA-512, BLAKE2, BLAKE3, MD5, etc. Hash functions are widely used to ensure data integrity, verify passwords, generate digital signatures, and support many other security protocols.
Denne historien er fra January 2026-utgaven av Open Source For You.
Abonner på Magzter GOLD for å få tilgang til tusenvis av kuraterte premiumhistorier og over 9000 magasiner og aviser.
Allerede abonnent? Logg på
FLERE HISTORIER FRA Open Source For You
Open Source For You
Apple acquires open source photonics startup invrs.io and hires its founder
Open source technology sits at the heart of Apple's latest acquisition.
1 min
April 2026
Open Source For You
OpenClaw adoption wave lifts China's tech stocks
OpenClaw, an open source autonomous AI agent, is driving a wave of investor enthusiasm in mainland China's stock markets, lifting shares of companies linked to the technology even as broader market sentiment remains subdued.
1 min
April 2026
Open Source For You
NVIDIA's NemoClaw could power Al-based warfare for India
NVIDIA has introduced NemoClaw, an open source, chip-agnostic AI platform designed to deploy agentic AI systems.
1 min
April 2026
Open Source For You
Microsoft flags fake Next.js repos are embedding staged backdoors inside build scripts
Attackers are seeding the open source ecosystem with malicious yet legitimatelooking Next.js repositories that embed staged backdoors inside build scripts and Microsoft dependencies, according to Microsoft.
1 min
April 2026
Open Source For You
NeoNephos expands its open source cloud ecosystem with new members
NeoNephos Foundation has expanded its pan-European open source cloud coalition with the addition of BWI GmbH as a Premier Member, SUSE LLC as a General Member, and Fraunhofer ISST as an Associate Member.
1 mins
April 2026
Open Source For You
Meta's Manus AI allows users to operate its agents through Telegram
The rise of OpenClaw is reshaping the AI agent market, compelling closed platforms to mirror features first popularised in the open source community. The latest example: Manus AI has introduced Telegrambased mobile control, a capability long central to OpenClaw's messaging-first approach.
1 min
April 2026
Open Source For You
China's DeepSeek has more than 75 million downloads on Hugging Face
Chinese AI lab DeepSeek is turning open source momentum into hardware leverage, with more than 75 million downloads of its models on Hugging Face helping Chinese AI releases surpass every other country on the platform.
1 min
April 2026
Open Source For You
Fractal's LLM Studio will help build domain-specific AI models
Fractal Analytics has launched LLM Studio, an enterprise platform designed to build, evaluate, and operate domain-specific language models using open source foundations, marking a shift away from closed, API-led AI approaches.
1 min
April 2026
Open Source For You
Monitoring Machine Learning in Production
Discover the concepts of drift and data skew, and explore online monitoring techniques that keep your machine learning model relevant.
5 mins
April 2026
Open Source For You
Managing Multi-Cloud Infrastructure: The Way Forward
Kubernetes and open source control planes make multi-cloud operations easier and help organisations build scalable and cloudagnostic infrastructure platforms.
7 mins
April 2026
Listen
Translate
Change font size
