Tags » Public-key Cryptography

Time to upgrade: SHAAAAAAAAAAAAA | Check your site for weak SHA-1 certificates.

They days of SHA-1 are quickly coming to an end. Chrome has already marked SHA-1 signed TLS/SSL certificates for having an expiration > 2015-12-31 as insecure… 129 more words

Power User

Encrypting OS X and iOS email with public keys

”In recent weeks, I’ve written about protecting data stored locally on a hard drive, against both people with physical access and potential remote attacks,” Glenn Fleishman writes for Macworld. 173 more words


A simple method of key verification for multi-device key exchange

There are tons of devices around with practically no user faced interface at all, which need to communicate securely with other devices. This includes devices such as a wireless thermometer communicating with a HVAC unit or a wireless lock on your door communicating with your phone when you tell it what keys to accept. 1,213 more words

Software/protocol Ideas

Question about public key cryptography with chemlambda

In this post Alice and Bob will communicate through #chemlambda computations.

Alice and Bob have each a mol file: Alice has A.mol and Bob has B.mol. 535 more words


Is factorization a hard problem?

Is factorization a hard problem? There is plenty of empirical evidence that it is so. Take the following 309-digit number that is known as RSA-1024, an example of an… 475 more words

Primality Testing

The magic words are squeamish ossifrage

The title of the blog post is the answer to a decryption challenge problem in connection to a factoring problem of a 129-digit number that is known as RSA-129. 1,424 more words

Fast Powering Algorithm

RSA [ Ron Rivest, Adi Shamir and Leonard Adleman ]


RSA algorithm is the first algorithm is public key cryptosystems also known as Asymmetric cryptography. In this every node has one set of key one is the public key and the other one is private key. 56 more words

Data Security