Tags » Cryptography

Configuring a Site-to-Site VPN Between Two Cisco Routers

A site-to-site virtual private network (VPN) allows you to maintain a secure “always-on” connection between two physically separate sites using an existing non-secure network such as the public Internet. 1,081 more words

News: Reports of SIGINT sabotage at Standing Rock. An analysis.

You may of heard of the protests at Standing Rock, the site of a future Oil Pipeline. Large protests have developed which have gotten 24/7 media attention. 1,027 more words


p@55w0rd$: Part 2

Last time, we looked at how passwords work. To confirm your identity, companies salt your password, they hash the salted password, and they check your hash. 1,569 more words

Blog Posts

Cryptosystems using free group automorphisms

Moldenhauer has proposed proposed cryptographic protocols which make use of . Here we describe them, for the fun of it, and because a potential closer analysis of their security suggests potentially interesting problems (or perhaps exercises—I don’t know enough / haven’t spent enough time to be able to judge) regarding automorphisms of free groups. 591 more words

Geometric Group Theory

News in brief: meals on robot wheels; Mirai blamed for new attacks; police bypass iPhone encryption

Your daily round-up of some of the other security stories in the news

Food delivery robots take to the streets

One hungry Londoner got a bit more than she bargained for earlier this week when her falafel and lamb cutlets… 536 more words

Law & Order

Cracking codes through time

From early tribal communication to the secrets of the world wars, cryptography has been a vital tool, ensuring the most important information is kept from enemies. 1,154 more words


Introduction to Cryptography

What is cryptography?

Cryptography “is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.” (Rouse, 2014). 102 more words