Skip to main content

Posts

Showing posts from August 26, 2018

Convert String into Struct in Go

Unmarshal string into JSON structure in Golang package main import ( "log" "encoding/json" ) type Student struct { Name string `json:"name"` RollNumber string `json:"roll_number"` } func ParseString(s string) { bytes := []byte(s) var student Student err := json.Unmarshal(bytes, &student) if err != nil { log.Println("Task/approval ParseString method fail:", err) } log.Println(student.Name, student.RollNumber) } func main() { var student string = `{"name":"Rohan", "roll_number":"123"}` ParseString(student) }

Digital Certificate

Digital Certificate A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). Component of Digital Certificate Information about Key or Fingerprints : A digital certificate contains information about key like size, the algorithm etc. Subject or Issued To : A digital certificate contains information about the identity of its owner called subject. Issuer or Issued By: A digital certificate also contains the digital signature of an entity that has verified the certificate's contents called issuer. certificate issuer is a certificate authority (CA). Validity Period : This is a time peroid for which certificate is valid. What certificate does?  If the signature is valid, and the software examining the certificate trusts the issuer, then it can use that key to communicate securely with the certificate's subject Pl...

Digital Signature

Digital Signature In this post, we will discuss about digital signature a widely used technique in computer security. Digital Signature Algorithm In cryptography digital signature present the authenticity of digital messages or documents. It follows the following  steps Generate Key: We use Some algorithm to generate a public key and private key Signing : We sign our documents or message with an algorithm that take private key and message string as input and gives a tag as output Verify : We use an algorithm on the recipient side to check the authenticity of a document or message. This algorithm takes a tag, private key and documents or message string as input and returns accepted or rejected i.e document is correct or not. Hashing : This is a set of an algorithm which takes an input string and return a fix length hash value know as a message digest. Hashing Algorithms MD5 SHA-0 SHA-1 SHA-2 SHA-3 Please wr...

Algonox Technologies Interview Experience

Algonox Technologies Interview Experience: Recently, I was interviewed for the Data Science engineer at  Algonox Technologies  Hyderabad. There was only one telephonic round interview. Company Name: Algonox Technologies Location:              Hyderbad Experience:          Fresher Mode:                  Telephonic Interview Designation:       Data Science Website:               Algonox Technologies Algonox Technologies Interview Experience First Round 1. Discussion about my project as I mentioned in the resume 2. Difference between compiler and interpreter 3. Difference between tuple and list in python 4. Problem Solving Binary search algorithm implementation Search element in a sorted rotated array There was one probability question Please write comments if you find anything i...