Tags » Public-key Cryptography

Encrypting OS X and iOS email with public keys

”In recent weeks, I’ve written about protecting data stored locally on a hard drive, against both people with physical access and potential remote attacks,” Glenn Fleishman writes for Macworld. 173 more words


A simple method of key verification for multi-device key exchange

There are tons of devices around with practically no user faced interface at all, which need to communicate securely with other devices. This includes devices such as a wireless thermometer communicating with a HVAC unit or a wireless lock on your door communicating with your phone when you tell it what keys to accept. 1,213 more words

Software/protocol Ideas


CRYPTOGRAPHY is the technique of converting the data into encrypted form.The unencrypted data is converted into CIPHER TEXT and then passed into the network . 58 more words