Cryptography April 20, 2021 Anastasios Arampatzis Encryption and etcd: The key to securing Kubernetes Kubernetes is great for container orchestration, but is it secure? Learn about etcd and encryption — and how they relate to cybersecurity....
Cryptography March 17, 2021 Rodika Tollefson Quantum cyberattacks: Preparing your organization for the unknown Quantum computing has been a buzzword for several years. And while it’s still the early days, several industries have been showing progress, and 2020 brought...
Cryptography March 16, 2021 Bernard Brode An Introduction to asymmetric vs symmetric cryptography Most people are aware of the basic idea behind cryptography — hiding a message with a code that can only be decoded by your intended recipient. However, this...
Cryptography March 11, 2021 Howard Poston Breaking Misused Stream Ciphers Encryption algorithms can be classified in a couple of different ways. A top-level distinction is between symmetric encryption algorithms (which use the same...
Cryptography March 10, 2021 Howard Poston Entropy Calculations Entropy is a measure of the randomness in a system. The more random the system, the less predictable it is and the higher its entropy. Entropy is useful...
Cryptography March 9, 2021 Howard Poston Blockchain and Asymmetric Cryptography Blockchain technology makes it possible to solve business problems in ways that were previously impossible. A major enabler of this is the decentralization...
Cryptography March 9, 2021 Howard Poston Security of the PKI Ecosystem Public Key Infrastructure (PKI) is the backbone of trust for many systems on the Internet. One of the most common uses of PKI is the HTTPS protocol, which...
Cryptography March 8, 2021 Howard Poston Elliptic Curve Cryptography As its name suggests, elliptic curve cryptography (ECC) uses elliptic curves (like the one shown above) to build cryptographic algorithms. Because of the...
Cryptography February 23, 2021 Kurt Ellzey Methods for Attacking Full Disk Encryption Full Disk Encryption is part of cryptography uses mathematical structures and operators. Cryptography and cryptanalysis functions are used in modern software...
Cryptography February 23, 2021 Kurt Ellzey Introduction to Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) uses mathematical structures and operators. Cryptography and cryptanalysis functions are used in modern software development....