🔐

Cryptography & Security

Cryptographic primitives, security patterns, and formal verification. From BLAKE2b and Ed25519 to zero-knowledge proofs and Byzantine fault tolerance.

01

Implementing BLAKE2b in Kotlin: A Cryptographic Hash Function

Architecture-first walkthrough of a BLAKE2b hash implementation for Kotlin/JVM, aligned with Cardano’s use of BLAKE2b-224/256, focusing on state layout, compression function, and testing against reference vectors.

13 min read Cryptography BLAKE2b Kotlin Cardano
02

Ed25519 Signatures: Theory and Implementation

Architecture-first guide to Ed25519 signatures on Kotlin/JVM, covering keys, signing, verification, and the structure of a pure implementation following RFC 8032.

12 min read Cryptography Ed25519 Signatures Kotlin
03

VRF (Verifiable Random Functions) in Blockchain Consensus

Draft

Deep dive into VRF cryptography used in Cardano's Ouroboros, covering ECVRF construction, proof generation, and verification. Includes Kotlin implementation.

04

KES (Key Evolving Signatures) for Forward Security

Draft

Exploration of KES signatures used in Cardano block production, covering key evolution, signature generation, and security properties. Includes practical implementation.

05

BLS Signatures for Blockchain Scalability

Draft

Guide to BLS signatures and their applications in blockchain systems, covering signature aggregation, threshold signatures, and use cases in Cosmos validators.

06

Merkle Trees and Merkle Proofs in Blockchain Systems

Draft

Practical guide to implementing Merkle trees for efficient data verification, covering tree construction, proof generation, and verification. Includes applications in Bitcoin SPV and Cardano state proofs.

07

Zero-Knowledge Proofs: An Introduction for Blockchain Developers

Draft

Introduction to ZK proofs and their applications in blockchain privacy, covering zk-SNARKs, zk-STARKs, and practical use cases. Includes simple proof-of-concept implementations.

08

Secure Key Management in Production Blockchain Systems

Draft

Best practices for managing cryptographic keys in production environments, covering HSMs, key derivation, rotation strategies, and secure storage patterns.

09

Implementing Constant-Time Cryptographic Operations

Draft

Guide to writing timing-attack resistant code, covering constant-time comparisons, conditional operations, and testing strategies. Essential for secure cryptographic implementations.

10

Secure Multi-Signature Wallets: Design and Implementation

Draft

Comprehensive guide to building multi-sig wallet infrastructure, covering threshold signatures, key ceremonies, and secure transaction signing workflows.

11

Preventing Double-Spend Attacks: UTXO Tracking Strategies

Draft

Practical patterns for preventing double-spend in UTXO-based systems, covering mempool management, confirmation tracking, and race condition handling.

12

Blockchain Security Auditing: A Developer's Checklist

Draft

Comprehensive security checklist for blockchain applications, covering smart contract vulnerabilities, key management, API security, and infrastructure hardening.

13

Rate Limiting and DDoS Protection for Blockchain APIs

Draft

Practical guide to protecting blockchain infrastructure from abuse, covering rate limiting strategies, request validation, and distributed denial-of-service mitigation.

14

Secure Random Number Generation in Blockchain Applications

Draft

Deep dive into cryptographically secure randomness, covering entropy sources, CSPRNG implementation, and common pitfalls in blockchain systems.

15

Audit Trails and Immutable Logging for Compliance

Draft

Implementing tamper-proof audit logs for regulated blockchain applications, covering log aggregation, cryptographic commitments, and compliance requirements.

16

Byzantine Fault Tolerance: Theory and Practice

Draft

Exploration of BFT consensus in blockchain systems, covering PBFT, Tendermint, and practical implementation considerations for distributed validator networks.

17

Sybil Attack Prevention in P2P Networks

Draft

Strategies for preventing Sybil attacks in blockchain P2P networks, covering peer reputation, proof-of-work, and stake-based admission control.

18

Secure Communication in Distributed Blockchain Networks

Draft

Implementing encrypted communication channels for blockchain nodes, covering TLS, noise protocol, and authenticated encryption patterns.

19

Consensus Safety and Liveness: Formal Verification Approaches

Draft

Introduction to formal verification of consensus protocols, covering safety properties, liveness guarantees, and model checking techniques.

20

Time and Synchronization in Distributed Blockchain Systems

Draft

Handling time in distributed systems, covering clock synchronization, timestamp validation, and slot-based consensus timing in Cardano and Cosmos.