Tags » Public-key Cryptography

Information security is a hard economic issue

Ross Anderson is reputed information security and cryptanalysis expert. He is the author of today’s paper review, with an interesting paper that was written in 2001, and as it is mentioned in a postscript right at around the time of the attack to the twin towers in New York, at the 11th September of that year. 1,877 more words

Information Technology

List of "Plain Text Offenders"; hopefully someone publishes a list of https offenders too

This Plain Text Offenders site lists email screenshots of organisations sending back plain-text passwords they kept on file (According to Robert Love, Idera/Embarcadero should be on the list as well). 632 more words

Power User

Using GPG for Public-Key Cryptography

Wikipedia has an accessible introduction of the subject. The GNU Privacy Manual is a good resource for detailed documentation.

Export Public Keys

To allow us to encrypt files with the public key of our correspondent, we first need to have access to their public key. 286 more words

Best Practices

Creating a GPG Keypair for Public-Key Encryption

GPG may be used to encrypt data and protect it from prying eyes. To use the public-key encryption method, we first need to generate a private-public keypair. 1,194 more words

Best Practices

Blog Post Shout Out: Securing Internet of Things and WiFi

With Internet of Things (IoT) devices becoming part of everyday life properly implementing public key encryption (defined) within them is a critical step that should not be overlooked. 128 more words

Security Advice

Diffie-Hellman Key Exchange - YouTube

Great explanation of Diffie-Hellman Key Exchange – YouTube.

It is based on mixing colors and some colors of the mix being private.

Brilliant!

–jeroen

Development