Cryptography February 2, 2021 Nitesh Malviya Introduction to full disk encryption Encryption is the process of converting plaintext to encrypted text. Encrypted text hides the original data from unauthorized users since encrypted text cannot...
Cryptography February 1, 2021 Nitesh Malviya 8 reasons you may not want to use VPNs You probably have heard about VPNs before. It’s even possible that you might have used one. In this post, we will be learning about VPN, some of its basic...
Cryptography January 11, 2021 Nitesh Malviya Rivest Cipher 4 (RC4) RC4 stands for Rivest Cipher 4. RC4 is a stream cipher and was invented by Ron Rivest in 1987. Since RC4 is a stream cipher, it encrypts the stream of data...
Cryptography January 11, 2021 Nitesh Malviya Understanding stream ciphers in cryptography Stream ciphers fall under the symmetric encryption category. Thus, using stream ciphers the sender and the recipient of the data use the same key to encrypt...
Cryptography January 5, 2021 Srinivas Cryptography Errors Many organizations make use of cryptography for securing their applications. A large portion of banking applications rely on some sort of cryptography. When...
Cryptography December 16, 2020 Nitesh Malviya Understanding block ciphers in cryptography Block ciphers fall under the symmetric encryption category. Thus, using block ciphers the sender and the recipient of the data use the same key to encrypt and...
Cryptography December 2, 2020 Srinivas How to mitigate Credential Management Vulnerabilities In the previous articles about credential management, we discussed how credentials can be used in applications and what can go wrong when dealing with credentials...
Cryptography December 1, 2020 Srinivas How To Exploit Credential Management Vulnerabilities In the previous article, we discussed some examples of poor credential management. Hardcoded credentials, improper error handling and insecure data storage...
Cryptography December 1, 2020 Srinivas Poor Credential Management As discussed in the previous article, use of credentials is one of the most common approaches used in applications and this is the de facto method that users...
Cryptography December 1, 2020 Srinivas How Is Cryptography Used In Applications? Cryptography is used in software to protect the data from adversaries. The key principles of cryptography is to provide confidentiality, integrity and authenticity...