Tags » Public-key Cryptography

A case study on SSL/TLS

I decided to write this post after a project I participated in, which required a web service to connect to a remote machine over SSL. Although I had already encountered the term “SSL” a lot of times, I soon realized that I had never fully understood how it really works and how it could be implemented in Java, so I started collecting information from the internet to make things clear. 2,872 more words

Public-key Cryptography

Time to upgrade: SHAAAAAAAAAAAAA | Check your site for weak SHA-1 certificates.

They days of SHA-1 are quickly coming to an end. Chrome has already marked SHA-1 signed TLS/SSL certificates for having an expiration > 2015-12-31 as insecure… 129 more words

Power User

Encrypting OS X and iOS email with public keys

”In recent weeks, I’ve written about protecting data stored locally on a hard drive, against both people with physical access and potential remote attacks,” Glenn Fleishman writes for Macworld. 173 more words


A simple method of key verification for multi-device key exchange

There are tons of devices around with practically no user faced interface at all, which need to communicate securely with other devices. This includes devices such as a wireless thermometer communicating with a HVAC unit or a wireless lock on your door communicating with your phone when you tell it what keys to accept. 1,213 more words

Software/protocol Ideas

Question about public key cryptography with chemlambda

In this post Alice and Bob will communicate through #chemlambda computations.

Alice and Bob have each a mol file: Alice has A.mol and Bob has B.mol. 535 more words


Is factorization a hard problem?

Is factorization a hard problem? There is plenty of empirical evidence that it is so. Take the following 309-digit number that is known as RSA-1024, an example of an… 475 more words

Primality Testing

The magic words are squeamish ossifrage

The title of the blog post is the answer to a decryption challenge problem in connection to a factoring problem of a 129-digit number that is known as RSA-129. 1,424 more words

Fast Powering Algorithm