Cryptography August 27, 2020 Howard Poston Secure Credential Management Passwords are the most popular method for implementing an authentication system despite their security issues. As a result, a cat-and-mouse game between hackers...
Cryptography August 27, 2020 Nitesh Malviya Introduction to Blockchain A blockchain is a record of digital transactions. It is a distributed software network which can function both as a digital ledger and as a mechanism allowing...
Cryptography August 27, 2020 Howard Poston Blockchain Technology Blockchain is a technology that has gained a great deal of attention in recent years. The goal of a blockchain network is to create an immutable digital ledger...
Cryptography August 27, 2020 Howard Poston Virtual Private Networks (VPNs) Virtual Private Networks (VPNs) are a solution designed to provide a secure connection between two parties over an untrusted network. Traffic is encrypted...
Cryptography August 25, 2020 Howard Poston Public Key Infrastructure: Architecture & Security The internet and many other digital systems rely upon public key infrastructure (PKI) to manage trust within a system. PKI includes a number of different...
Cryptography August 25, 2020 Howard Poston Hash Functions Hash functions are unique because they use cryptographic primitives and principles but are not cryptographic algorithms. Unlike symmetric and asymmetric encryption...
Cryptography August 25, 2020 Howard Poston Asymmetric Cryptography Asymmetric cryptography differs from symmetric cryptography in that it uses two encryption keys: a public key and a private key. These keys are related by...
Cryptography August 25, 2020 Howard Poston Fundamentals of Cryptography Cryptography can seem complex, but a lot of cryptography boils down to some very simple mathematical operators and structures. In this article, we talk about...
Cryptography August 24, 2020 Howard Poston Symmetric Cryptography Symmetric cryptography gets its name from the fact that the same secret key is used for encryption and decryption, thus making the process symmetrical. The...
Cryptography August 17, 2020 Howard Poston Introduction to cryptography Cryptology — literally “the study of secrets” — is composed of cryptography (making codes) and cryptanalysis (breaking codes). However, many people...