Tags » Cryptography

The Cryptonomicon

The Cryptonomicon (also sometimes referred to as the Old Testament of the contemporary crypto community, I title it competes for with The Sovereign Individual) was apparently “required reading” for Elon Musk and Peter Thiel’s team members in the early days of PayPal. 166 more words

Reading Right Now

GNU: A Heuristic for Bad Cryptography

If you see the letters GNU in a systems design, and that system intersects with cryptography, I can almost guarantee that it will be badly designed to an alarming degree. 1,559 more words

Cryptography

Padding Oracle attack for decryption endpoints

Let’s imagine that we have an endpoint or service which decrypts some portion of sensitive data: encrypted jwt token, financial or PII data.

public interface DecryptService {
     public String decrypt(String encryptedText);
}
… 349 more words
Java

ISO 27001 Annex : A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users

ISO 27001 Annex : A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users these two topic is explained in this article. 650 more words

ISO 27001

Code Audit of Boxcryptor

Boxcryptor is a software developed by Secomba GmbH which focuses on protecting files stored on external cloud providers by over-encrypting the files and even the file names to prevent the cloud provider from accessing the data within the said files, while still allowing synchronisation with multiple devices. 374 more words

Crypto

1st July 2020- A revitalisation of OscarMaths and an essay: Does P = NP?

OscarMaths is heading in a new direction

After a few years, it is returning with all the same fun and exciting maths as before… and more… 1,069 more words

Clay Mathematics Institute

Secure Data Transmission Using Steganography and Encryption Technique  

Shamim Ahmed Laskar and Kattamanchi Hemachandran, Assam University, India

ABSTRACT

With the spread of digital data around the world through the internet, the security of the data has raised a concern to the people. 200 more words

Cryptography And Information Security