Tags » Public-key Cryptography

Using GPG for Public-Key Cryptography

Wikipedia has an accessible introduction of the subject. The GNU Privacy Manual is a good resource for detailed documentation.

Export Public Keys

To allow us to encrypt files with the public key of our correspondent, we first need to have access to their public key. 286 more words

Best Practices

Creating a GPG Keypair for Public-Key Encryption

GPG may be used to encrypt data and protect it from prying eyes. To use the public-key encryption method, we first need to generate a private-public keypair. 1,194 more words

Best Practices

Blog Post Shout Out: Securing Internet of Things and WiFi

With Internet of Things (IoT) devices becoming part of everyday life properly implementing public key encryption (defined) within them is a critical step that should not be overlooked. 128 more words

Security Advice

Diffie-Hellman Key Exchange - YouTube

Great explanation of Diffie-Hellman Key Exchange – YouTube.

It is based on mixing colors and some colors of the mix being private.




Asymmetric & Symmetric Primitives

A short note by way of raising discussion on some ‘key’differences between the involution logic of the Alex DeCastro work presented here and the PRG, temporal error feed-forward of… 173 more words

Cryptography Pioneers Receive ACM A.M. Turing Award

Modern day cryptography involves some absolutely fascinating math, some of which I have been fortunate to have been exposed to while working in the field of digital video broadcast systems.  733 more words