Editors' Pick

Trending Posts

Popular Post

Recent Posts

post-thumb

Migration towards Quantum-Safe payments

Introduction

Today’s payment systems are heavily dependent on traditional cryptographic security protocols such as RSA 2048 (asymmetric) and AES 256 (symmetric) to secure data and communications. The NIST also recommends [1] RSA 2048 key size is the most used in the industry such as EMV 3DS specification recommends such key size [2] or above. The usefulness of the asymmetric cryptographic primitives RSA, Elliptic curve based, and symmetric cryptographic primitive AES are huge in payments, refer to our previous blog post to find in detail, you can find a description of where these RSA, Eliptic curve or AES cryptographic primitives are used for payments and how the asymmetric ones (RSA, EC) are absolutely threatened by quantum computers. And even if quantum computing does not pose a fatal threat to symmetric cryptography such as AES, you need to double the key length to guarantee the same level of security against a quantum computer attack.

Read more Details
post-thumb

Help! Quantum Computers are threatening our payments!

Introduction

Modern cryptography has been used to enable secure communications between individuals or servers, even if these entities do not share any pre-established secret. The cryptographic primitives allow kickstarting a secure channel primarily to deliver two main functionalities: protected channel establishment (known as key establishment) and authentication of digital information/parties (by the use of digital signatures). Once the channel is established, it can use other cryptographic primitives to secure communications over the Internet, provide the root of trust for secure transactions in the digital economy, and keep data private by encrypting it.

Read more Details

How to build a dynamic micro-frontend architecture in React?

First of all, what is this Micro-frontend thing?

Alright, let’s get into it – Micro-Frontend Architecture, a game-changer in web development. Say goodbye to those bulky monolithic structures we’re all tired of. Micro-Frontend Architecture breaks down the frontend into smaller, more manageable chunks. It’s like breaking a big rock into smaller stones – easier to handle, right?

Read more Details
post-thumb

Understanding the potential of Modulith architecture

In software architecture, it is always about finding the best solution for your use case and your application in your specific context. Based on that, you have the challenge to find the right balance between flexibility and simplicity. We often must decide between a monolithic system and a microservice architecture. For a long time, the monolithic architecture has been the way to go. Then, microservices came up and most architectures followed way. This blogpost is about the relatively new architecture approach of modulith that finds its place in-between the other two approaches and tries to combine their benefits.

Read more Details
post-thumb

Metric-Driven Development of a RAG system

Prerequisites

  • Basic knowledge of pros and cons of LLM APIs
  • Preliminary knowledge of RAG structure

Introduction

Retrieval Augmented Generation (RAG) is commonly used to enhance the performance of LLM-based systems or incorporate domain-specific knowledge to improve the generated answers of the LLM. However, effectively evaluating and tracking the performance of a RAG system is not straightforward, posing a real challenge in the development and monitoring of such systems in a production environment.

Read more Details