Posts

Showing posts from March, 2019

Cryptography

Image
Cryptography Encryption Algorithms Encryption systems are often grouped into families. Common families include symmetric systems (e.g. AES) and asymmetric systems (e.g. RSA); They may alternatively be grouped according to the central algorithm used (e.g. elliptic curve cryptography). Table 1. Major Difference - Symmetric Asymmetric Keys Single Key(Secret Key) Two Keys (Public & Private) KeyLength - 1024, 2048, 4096 Algorithms 3DES, DES, RC4, AES, QUAD RSA, ECC Performance Fast in its execution Slower in execution as a result of more complex algorithms which come with a high computation burden. Purpose Bulk data encryption(text file encryption) Asymmetric encryption used mostly used for securely exchange secret keys(of symmetric encryption) Symmetric Algorithm (AES) AES is a Symmetric encryption algorithm also called SecretKey Encryption . It employs the same secret key for both encryption and decryption. L

Spring boot Kafka Integration

Image
Introduction Introduction K afka is an open source streaming platform which scales very well in a horizontal way without compromising speed and efficiency. The Kafka core is written in Scala , and Kafka Streams and KSQL are written in Java . Features Kafka is a service bus To connect heterogeneous applications, we need to implement a message publication mechanism to send and receive messages among them. A message router is known as message broker . Kafka is a message broker , a solution to deal with routing messages among clients in a quick way. Kafka architecture has two directives The first is to not block the producers (to deal with back pressure). The second is to isolate producers and consumers . The producers should not know who their consumers are, hence the kafka follows the dumb broker and smart clients model. Tip Back pressure is to make applications robust against data surges. when producer generates data higher rate tha