Tags » Public-key Cryptography

List of "Plain Text Offenders"; hopefully someone publishes a list of https offenders too

This Plain Text Offenders site lists email screenshots of organisations sending back plain-text passwords they kept on file (According to Robert Love, Idera/Embarcadero should be on the list as well). 632 more words

Power User

Using GPG for Public-Key Cryptography

Wikipedia has an accessible introduction of the subject. The GNU Privacy Manual is a good resource for detailed documentation.

Export Public Keys

To allow us to encrypt files with the public key of our correspondent, we first need to have access to their public key. 286 more words

Best Practices

Creating a GPG Keypair for Public-Key Encryption

GPG may be used to encrypt data and protect it from prying eyes. To use the public-key encryption method, we first need to generate a private-public keypair. 1,194 more words

Best Practices

Blog Post Shout Out: Securing Internet of Things and WiFi

With Internet of Things (IoT) devices becoming part of everyday life properly implementing public key encryption (defined) within them is a critical step that should not be overlooked. 128 more words

Security Advice

Diffie-Hellman Key Exchange - YouTube

Great explanation of Diffie-Hellman Key Exchange – YouTube.

It is based on mixing colors and some colors of the mix being private.




Asymmetric & Symmetric Primitives

A short note by way of raising discussion on some ‘key’differences between the involution logic of the Alex DeCastro work presented here and the PRG, temporal error feed-forward of… 173 more words