Helpful tools for code profiling in Python ★ Posted on April 16, 2020
Code profiling is one of the most important parts of the code optimisation process. Generally speaking, it is the program analysis where we are mainly interested in memory usage and time complexity of the program (or each of its parts). We can also be interested in how often we use some function (or how often we call it, what is the latency). There are a lot of principles and tools to perform these tasks. This article is mainly focused on stack tracing, line-by-line code analysis tools, and function call graphs.
DevOps challenges of the system for processing big data ★ Posted on March 07, 2020
There are many common challenges in systems that process large data sets like videos, images, large feeds and similar. One of the most important decisions is whether to deploy infrastructure on some cloud service or if it is better to use an on-premises solution. Ultimately, if you decide to use a cloud-based solution, other challenges arise, like which provider would be the best one, how to deploy - use infrastructure as a code, or just some simple solution etc. Also, there are many interesting services that are cheap or free and can be helpful like Dropbox.
The concepts for the secure authentication process in web application ★ Posted on April 25, 2019
One of the everyday challenges in back-end development is designing and developing a secure authentication and authorization process. There are many solutions available, but deploying them without a thorough understanding of how they internally work is dangerous. Therefore, we present here the most common way of dealing with the authentication process. The most popular forms of dealing with this issue are session-based authentication and token-based authentication.
The security perspective of RSA cryptosystem ★ Posted on January 22, 2019
Currently, the most popular public-key cryptosystem is still RSA. It is even though more sophisticated and secure systems are available (including quantum-resistant ones). It is probably due to the relative simplicity of the algorithm, long history and general technical support. On the other hand, considering the advancement in quantum computers development and programmable hardware, the security of this cryptosystem is becoming more and more questionable.
What is really the optimal size and composition of the password ★ Posted on November 15, 2018
During the last few years, we could see a revolution in entering passwords into online services (e-shops, email providers, social networks etc.). This revolution ensued in a surge of forgotten passwords. More and more users forget passwords just after entering them, leading to an increasing number of toolkits for storing passwords where each has its vulnerabilities.
The concept for an acceleration of public-key cryptanalysis methods ★ Posted on November 05, 2018
The Xilinx Zynq-7000 SoC provides new possibilities for increasing the efficiency of cryptanalysis methods for the public-key systems such as RSA or Diffie-Hellman key exchange algorithm. These cryptosystems are based on the discrete logarithm and integer factorization problem. After a brief introduction to numerical methods for solving these problems, there is an introduction to the distributed system that aims to solve these problems.