Cryptography March 11, 2021 Howard Poston Breaking misused stream ciphers Encryption algorithms can be classified in a couple of different ways. A top-level distinction is between symmetric encryption algorithms (which use the same...
Cryptography March 10, 2021 Howard Poston Entropy calculations Entropy is a measure of the randomness in a system. The more random the system, the less predictable it is and the higher its entropy. Entropy is useful...
Cryptography March 9, 2021 Howard Poston Blockchain and asymmetric cryptography Blockchain technology makes it possible to solve business problems in ways that were previously impossible. A major enabler of this is the decentralization...
Cryptography March 9, 2021 Howard Poston Security of the PKI ecosystem Public Key Infrastructure (PKI) is the backbone of trust for many systems on the Internet. One of the most common uses of PKI is the HTTPS protocol, which...
Cryptography March 8, 2021 Howard Poston Elliptic curve cryptography As its name suggests, elliptic curve cryptography (ECC) uses elliptic curves (like the one shown below) to build cryptographic algorithms. Because of the...
Cryptography February 23, 2021 Kurt Ellzey Methods for attacking full disk encryption Full disk encryption is part of cryptography that uses mathematical structures and operators. Cryptography and cryptanalysis functions are used in modern software...
Cryptography February 23, 2021 Kurt Ellzey Introduction to Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) uses mathematical structures and operators. Cryptography and cryptanalysis functions are used in modern software development....
Cryptography February 4, 2021 Nitesh Malviya Introduction to the TLS/SSL cryptography protocol SSL stands for Secure Socket Layer. First version of SSL was developed by Netscape in 1995. SSL is the industry standard to establish secure internet connection...
Cryptography February 4, 2021 Nitesh Malviya Introduction to Diffie-Hellman Key Exchange Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data from...
Cryptography February 3, 2021 Nitesh Malviya Introduction to the Rivest-Shamir-Adleman (RSA) encryption algorithm Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data from...