<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cangea</title>
	<atom:link href="https://cangea.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cangea.com</link>
	<description>Blockchain Payment Solutions</description>
	<lastBuildDate>Mon, 15 Mar 2021 02:12:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://cangea.com/wp-content/uploads/2022/02/cropped-cng-favi-32x32.png</url>
	<title>Cangea</title>
	<link>https://cangea.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Introduction to Smart Contracts</title>
		<link>https://cangea.com/introduction-to-smart-contracts/</link>
					<comments>https://cangea.com/introduction-to-smart-contracts/#respond</comments>
		
		<dc:creator><![CDATA[CNG]]></dc:creator>
		<pubDate>Thu, 12 Mar 2020 20:57:42 +0000</pubDate>
				<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Smart Contracts]]></category>
		<category><![CDATA[cangea smart contracts]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[what are smart contracts]]></category>
		<guid isPermaLink="false">https://cangea.com/?p=40008</guid>

					<description><![CDATA[<p>A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions. A smart contract not only defines the rules and penalties related to an agreement in the same way that a traditional contract does, but it also automatically enforces [&#8230;]</p>
The post <a href="https://cangea.com/introduction-to-smart-contracts/">Introduction to Smart Contracts</a> first appeared on <a href="https://cangea.com">Cangea</a>.]]></description>
										<content:encoded><![CDATA[<p class="p2"><span class="s1">A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions. A smart contract not only defines the rules and penalties related to an agreement in the same way that a traditional contract does, but it also automatically enforces those obligations.</span></p>
<p class="p1"><span class="s1">Smart contracts ace as a computer protocol intended to facilitate, verify, or enforce the negation or performance of an agreement.<span class="Apple-converted-space">  </span>The process by which smart contracts are implemented occurs within a decentralized environment, thus negating the possibility of human error.<span class="Apple-converted-space">  </span>Smart contracts allow for the performance of credible transactions without the necessity of a third party. Using the transfer of value in a smart contract requires the use of a cryptocurrency.<span class="Apple-converted-space">  </span>Smart contracts offer many kinds of contractual clauses that may be made partially or entirely self-executing, self-enforcing, or both.<span class="Apple-converted-space">  </span>Ethereum describes smart contracts as “applications that run exactly as programmed without the possibility of downtime, censorship, fraud, or third-party interference.”</span></p>
<p><span style="font-weight: 400;"><strong>Cangea has developed a suite of software solutions</strong> that provide business, financial institutions, and governments, the ability to incorporate smart contracts into their operations. The Cangea software suite enables users to quickly build and deploy sophisticated Smart Contracts to the Cangea Core™ blockchain without any previous coding experience. </span><span style="font-weight: 400;">The on-chain elements of Cangea are composed of several unique smart contract components that work seamlessly together to create the full functionality of the application.</span></p>
<h3><a href="https://medium.com/@cangeaproject"><strong>Learn more on <em>Cangea Smart Contracts</em></strong></a></h3>The post <a href="https://cangea.com/introduction-to-smart-contracts/">Introduction to Smart Contracts</a> first appeared on <a href="https://cangea.com">Cangea</a>.]]></content:encoded>
					
					<wfw:commentRss>https://cangea.com/introduction-to-smart-contracts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>History of Cryptography &#124; The Vigenère Cipher</title>
		<link>https://cangea.com/history-of-cryptography-the-vigenere-cipher/</link>
					<comments>https://cangea.com/history-of-cryptography-the-vigenere-cipher/#respond</comments>
		
		<dc:creator><![CDATA[CNG]]></dc:creator>
		<pubDate>Thu, 22 Aug 2019 18:06:19 +0000</pubDate>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[The Vigenère Cipher]]></category>
		<guid isPermaLink="false">https://cangea.com/?p=39818</guid>

					<description><![CDATA[<p>The Vigenère Cipher The Vigenère Cipher, created in the 16th century, uses an element not found in a Caesar Cipher: a secret key.  The creator of the code picks any word or combination of letters at random to be the key, for example, “DOG.”  The keyword chosen will then be matched to the plaintext message [&#8230;]</p>
The post <a href="https://cangea.com/history-of-cryptography-the-vigenere-cipher/">History of Cryptography | The Vigenère Cipher</a> first appeared on <a href="https://cangea.com">Cangea</a>.]]></description>
										<content:encoded><![CDATA[<h3>The Vigenère Cipher</h3>
<p>The Vigenère Cipher, created in the 16th century, uses an element not found in a Caesar Cipher: a secret key.  The creator of the code picks any word or combination of letters at random to be the key, for example, “DOG.”  The keyword chosen will then be matched to the plaintext message that you want to encrypt, for example, “ATTACK.”  You can see that the keyword “dog” is shorter than the word “attack&#8221; by three letters.  In this case, repeat your key until it matches the number of letters in your plaintext message.  In this case, you would then have “DOGDOG.</p>
<p>Now, you will be able to create the ciphertext.  To do this, you will need to use the chart below.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-39819" src="https://cangea.com/wp-content/uploads/2019/08/vigenere-cipher.png" alt="The Vigenère Cipher" width="455" height="455" srcset="https://cangea.com/wp-content/uploads/2019/08/vigenere-cipher.png 910w, https://cangea.com/wp-content/uploads/2019/08/vigenere-cipher-150x150.png 150w, https://cangea.com/wp-content/uploads/2019/08/vigenere-cipher-300x300.png 300w, https://cangea.com/wp-content/uploads/2019/08/vigenere-cipher-768x768.png 768w, https://cangea.com/wp-content/uploads/2019/08/vigenere-cipher-250x250.png 250w" sizes="(max-width: 455px) 100vw, 455px" /></p>
<p>The columns are the letters of the secret key, while the rows are the letters of the plaintext message.  So for our example, the first letter of our key is “D,” while the first letter of our plaintext word is “A.”  So, find where they intersect on the chart, and you will find the first letter of our ciphertext, which is “D.”  Next, the second letters of our key and plaintext words are “O” and “T” respectively.  They intersect at “H.” You would continue this until you complete all six letters.</p>
<p><strong>Plaintext Message:</strong> ATTACK</p>
<p><strong>Key:</strong> DOGDOG</p>
<p><strong>Ciphertext:</strong> DHZDQQ</p>
<h3>Cryptanalysis: Cracking a Vigenère Cipher</h3>
<p>Because of the use of a key, the Vigenère Cipher cannot initially be cracked by using a simple frequency analysis like you could do with a Caesar Cipher.  Though, the main weakness of a Vigenère Cipher is the repeating of the key.  So, in our example, “dog” was repeated twice in order to match the number of letters in the word “attack.”  If an attacker guesses the key’s length, it becomes much easier to crack.  The ciphertext is then treated like a series of small Caesar Ciphers, and a method such as frequency analysis could then be performed to crack the code.</p>
<p>But how can an attacker guess the length of the key?  There are actually two methods: the Kasiski examination and the Friedman test.  If the attacker notices that there are repeated segments of text in the ciphertext, a Kasiski examination would be effective in cracking the code.  The attacker would count the distance of letters between repeated text to get a good idea of how long the key is.  The Friedman test takes an algebraic approach utilizing a formula to measure the unevenness of the cipher letter frequencies to break the cipher.  The longer the text, the more accurate this technique is.</p>
<p><strong>Read More on the History of Cryptography</strong></p>The post <a href="https://cangea.com/history-of-cryptography-the-vigenere-cipher/">History of Cryptography | The Vigenère Cipher</a> first appeared on <a href="https://cangea.com">Cangea</a>.]]></content:encoded>
					
					<wfw:commentRss>https://cangea.com/history-of-cryptography-the-vigenere-cipher/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>History of Cryptography &#8211; Caesar Box</title>
		<link>https://cangea.com/historical-cryptography-caesar-box/</link>
					<comments>https://cangea.com/historical-cryptography-caesar-box/#respond</comments>
		
		<dc:creator><![CDATA[CNG]]></dc:creator>
		<pubDate>Thu, 22 Aug 2019 17:49:16 +0000</pubDate>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[caesar box]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[dashboard]]></category>
		<guid isPermaLink="false">https://cangea.com/?p=39810</guid>

					<description><![CDATA[<p>Caesar Box The “Caesar Box,” or “Caesar Cipher,” is one of the earliest known ciphers. Developed around 100 BC, it was used by Julius Caesar to send secret messages to his generals in the field. In the event that one of his messages got intercepted, his opponent could not read them. This obviously gave him [&#8230;]</p>
The post <a href="https://cangea.com/historical-cryptography-caesar-box/">History of Cryptography – Caesar Box</a> first appeared on <a href="https://cangea.com">Cangea</a>.]]></description>
										<content:encoded><![CDATA[<p><strong>Caesar Box</strong><br />
The “Caesar Box,” or “Caesar Cipher,” is one of the earliest known ciphers. Developed around 100 BC, it was used by Julius Caesar to send secret messages to his generals in the field. In the event that one of his messages got intercepted, his opponent could not read them. This obviously gave him a great strategic advantage. So, what was the code?</p>
<p>Caesar shifted each letter of his message three letters to the right to produce what could be called the ciphertext. The ciphertext is what the enemy would see instead of the true message. So, for example, if Caesar’s messages were written in the English alphabet, each letter “A” in the message would become a “D,” the “B’s” would become “E’s,” and the “X&#8217;s” become “A’s.” This type of cipher is appropriately called a “shift cipher.”</p>
<p>Caesar’s magic number was three, however, a modern day use of the Caesar Cipher is a code called “ROT13.” ROT13, short for “rotate by 13 places,” shifts each letter of the English alphabet 13 spaces. It is often used in online forums to hide information such as movie and tv show spoilers, solutions to puzzles or games, or offensive material. The code is easily crackable, however, it hides the information from the quick glance.<br />
Cryptanalysis: Breaking a Caesar Box<br />
The hardest part of breaking a Caesar Box is figuring out the language of the message that it encodes. Once the code cracker figures this out, two scenarios are considered. Either the “attacker” utilizes a technique such as frequency analysis, or they use what is referred to as a brute force attack.</p>
<p>In the first instance, the attacker knows that certain letters are used more frequently than others. For example, A,E,O, and T are the most commonly used letters, while Q, X, and Z are the least. The relative frequencies of each letter in the English language are shown in the graph below.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-39812" src="https://cangea.com/wp-content/uploads/2019/08/relative-frequencies-of-letters-in-the-english-language-graph.jpg" alt="Caesar Box Letter frequency" width="940" height="620" srcset="https://cangea.com/wp-content/uploads/2019/08/relative-frequencies-of-letters-in-the-english-language-graph.jpg 940w, https://cangea.com/wp-content/uploads/2019/08/relative-frequencies-of-letters-in-the-english-language-graph-300x198.jpg 300w, https://cangea.com/wp-content/uploads/2019/08/relative-frequencies-of-letters-in-the-english-language-graph-768x507.jpg 768w" sizes="(max-width: 940px) 100vw, 940px" /></p>
<p>If using a simple substitution cipher such as frequency analysis does not crack the code, an attacker could perform a brute force attack.  This kind of attack entails testing each possible shift on a small snippet of the message.  So, if the message is written in English, this would require a maximum of 26 tests since there are 26 letters in the English alphabet.  While this is not a particularly sophisticated attack, it is effective.</p>The post <a href="https://cangea.com/historical-cryptography-caesar-box/">History of Cryptography – Caesar Box</a> first appeared on <a href="https://cangea.com">Cangea</a>.]]></content:encoded>
					
					<wfw:commentRss>https://cangea.com/historical-cryptography-caesar-box/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why the name Cangea?</title>
		<link>https://cangea.com/why-the-name-cangea/</link>
					<comments>https://cangea.com/why-the-name-cangea/#respond</comments>
		
		<dc:creator><![CDATA[CNG]]></dc:creator>
		<pubDate>Sat, 08 Jun 2019 17:05:28 +0000</pubDate>
				<category><![CDATA[About Us]]></category>
		<category><![CDATA[cangea]]></category>
		<category><![CDATA[cangea crypto]]></category>
		<category><![CDATA[pangea]]></category>
		<guid isPermaLink="false">https://cangea.com/?p=39054</guid>

					<description><![CDATA[<p>Why the name “Cangea?” We put a spin on the name “Pangea” which is derived from Ancient Greek Language and means “Entire Earth” or “All Land.” Pangea was the name given to the Super Continent when all of the continents once formed one united land mass. We chose this word because we believe that decentralization is [&#8230;]</p>
The post <a href="https://cangea.com/why-the-name-cangea/">Why the name Cangea?</a> first appeared on <a href="https://cangea.com">Cangea</a>.]]></description>
										<content:encoded><![CDATA[<p><strong>Why the name “Cangea?</strong>”</p>
<p>We put a spin on the name “Pangea” which is derived from Ancient Greek Language and means “Entire Earth” or “All Land.” Pangea was the name given to the Super Continent when all of the continents once formed one united land mass. <strong>We chose this word because we believe that decentralization is key to a unified World and a unified financial ecosystem.</strong></p>
<p>We are focused on developing fin-tech solutions for a unified World. Our goal is to create technology that offers a value proposition that extends across the globe. We are digital pioneers providing the financial industry with new experiences.</p>
<p>&nbsp;</p>The post <a href="https://cangea.com/why-the-name-cangea/">Why the name Cangea?</a> first appeared on <a href="https://cangea.com">Cangea</a>.]]></content:encoded>
					
					<wfw:commentRss>https://cangea.com/why-the-name-cangea/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
