Crypto Paycheck
Photo by Mario Gogh on UnsplashEmployees will receive their paycheck in the period as a reward for their work. However, the employer wants to pay less to employees so that they can have maximum profits. The tension between working and anti-working has increased ever since. TL;DR Nobody wants to work unless they can pay fairly. Fiat payment may not be sustainable to satisfy what workers can contribute if the employer continues paying less and gaining more from profits. Employees will want thei...
Defi Review #4: AAVE The Defi Lending Services
AAVE is a decentralized finance lending service before decentralized finance even existed. It is an innovation lending service in crypto and one of the first kind. However, the lending service may only restrict to the crypto community and it may expand into the traditional financial field later. TL;DR AAVE is a crypto lending financial service which to provides lending services to the crypto community. They focus on security and smart contract lending may be the future of financial services. ...

Stablecoin Crisis
Stablecoin is in the crisis mode. The most reputable stablecoin USDC is depegged. It is all triggered by the traditional bank collapse - Silicon Valley Bank or SVB collapse. Why traditional bank collapse impacts crypto stablecoin? Let's sort this out and reveal how stablecoin operates. First, why SVB collapse? The short answer is overleveraged. SVB is one of the 20 largest commercial banking in the United States. Some even estimate the bank owned half of startup assets. Bank operated in ...

I tried to explain what RC4 is in comic strips.
TL;DR
I explained what RC4 is and how you can break RC4.

Some Takeaway
RC4 or Rivest’s Cipher 4 was designed in 1987. It was a proprietary algorithm from RSA Security until it was reverse engineered and released into the public in 1994. Despite lacking academic peer-review, the simplistic and efficient design helped the public to massive adoption of such an algorithm until a security flaw was discovered in 2005.
What is the Logic Behind RC4
The logic behind RC4 is to randomly generate numbers to disguise secret messages and rearrange the way that no one can recognize them. When one wants to decrypt the secret code, the procedure then can reverse to reveal the secret messages.
Two Components of RC4
There are two distinct algorithms in RC4: Key Setup Algorithm (KSA) and Pseudo-random Generation Algorithm (PRGA).
Key Setup Algorithm (KSA) is an initial stage to generate array S. It is an initial stage to set up an initial key position and to replace the secret key for the next stage.
Pseudo-random Generation Algorithm (PRGA) is a process to get a keystream that is a key-value bridge between encryption and decryption.
Encryption and Decryption Procedure
The process of encryption involves:
The user inputs a plain text file and a secret key
The algorithm generates the keystream
The keystream will pair with plain text and hide the information through new series of digits as an encrypted text
The encrypted text is sent to the intended receiver and the receiver will decrypt the text and reveal the plain text
The process of decryption involves:
Using the algorithm to inverse value from encrypted text and keystream
You can see the process is straightforward and efficient.
Advantages and Disadvantages
RC4’s advantages are simple to use and implement efficient performance and can handle large streams of data. The disadvantage of RC4 is that it is relatively easy to break in under an hour.
How to Break into RC4
The problem with RC4 is that the algorithm only repositioned the digit array location without changing its value. It is possible to guess the initial value if you know the initial position of the array. The NOMORE attack in 2015 demonstrated how easily RC4 can be cracked so long as attackers receive the initial value of RC4 through injecting code.
In conclusion
RC4 is an efficient algorithm to protect security with a simple and interactive process. It offers such technology available to advance and create a more secure network in the future.

I tried to explain what RC4 is in comic strips.
TL;DR
I explained what RC4 is and how you can break RC4.

Some Takeaway
RC4 or Rivest’s Cipher 4 was designed in 1987. It was a proprietary algorithm from RSA Security until it was reverse engineered and released into the public in 1994. Despite lacking academic peer-review, the simplistic and efficient design helped the public to massive adoption of such an algorithm until a security flaw was discovered in 2005.
What is the Logic Behind RC4
The logic behind RC4 is to randomly generate numbers to disguise secret messages and rearrange the way that no one can recognize them. When one wants to decrypt the secret code, the procedure then can reverse to reveal the secret messages.
Two Components of RC4
There are two distinct algorithms in RC4: Key Setup Algorithm (KSA) and Pseudo-random Generation Algorithm (PRGA).
Key Setup Algorithm (KSA) is an initial stage to generate array S. It is an initial stage to set up an initial key position and to replace the secret key for the next stage.
Pseudo-random Generation Algorithm (PRGA) is a process to get a keystream that is a key-value bridge between encryption and decryption.
Encryption and Decryption Procedure
The process of encryption involves:
The user inputs a plain text file and a secret key
The algorithm generates the keystream
The keystream will pair with plain text and hide the information through new series of digits as an encrypted text
The encrypted text is sent to the intended receiver and the receiver will decrypt the text and reveal the plain text
The process of decryption involves:
Using the algorithm to inverse value from encrypted text and keystream
You can see the process is straightforward and efficient.
Advantages and Disadvantages
RC4’s advantages are simple to use and implement efficient performance and can handle large streams of data. The disadvantage of RC4 is that it is relatively easy to break in under an hour.
How to Break into RC4
The problem with RC4 is that the algorithm only repositioned the digit array location without changing its value. It is possible to guess the initial value if you know the initial position of the array. The NOMORE attack in 2015 demonstrated how easily RC4 can be cracked so long as attackers receive the initial value of RC4 through injecting code.
In conclusion
RC4 is an efficient algorithm to protect security with a simple and interactive process. It offers such technology available to advance and create a more secure network in the future.
Crypto Paycheck
Photo by Mario Gogh on UnsplashEmployees will receive their paycheck in the period as a reward for their work. However, the employer wants to pay less to employees so that they can have maximum profits. The tension between working and anti-working has increased ever since. TL;DR Nobody wants to work unless they can pay fairly. Fiat payment may not be sustainable to satisfy what workers can contribute if the employer continues paying less and gaining more from profits. Employees will want thei...
Defi Review #4: AAVE The Defi Lending Services
AAVE is a decentralized finance lending service before decentralized finance even existed. It is an innovation lending service in crypto and one of the first kind. However, the lending service may only restrict to the crypto community and it may expand into the traditional financial field later. TL;DR AAVE is a crypto lending financial service which to provides lending services to the crypto community. They focus on security and smart contract lending may be the future of financial services. ...

Stablecoin Crisis
Stablecoin is in the crisis mode. The most reputable stablecoin USDC is depegged. It is all triggered by the traditional bank collapse - Silicon Valley Bank or SVB collapse. Why traditional bank collapse impacts crypto stablecoin? Let's sort this out and reveal how stablecoin operates. First, why SVB collapse? The short answer is overleveraged. SVB is one of the 20 largest commercial banking in the United States. Some even estimate the bank owned half of startup assets. Bank operated in ...
Share Dialog
Share Dialog

Subscribe to xuanling11

Subscribe to xuanling11
<100 subscribers
<100 subscribers
No activity yet