Cryptography

Breaking misused stream ciphers

Encryption algorithms can be classified in a couple of different ways.  A top-level distinction is between symmetric encryption algorithms (which use the sam

Entropy calculations

Entropy is a measure of the randomness in a system.  The more random the system, the less predictable it is and the higher its entropy. [pkadzone zone="ma

Blockchain and asymmetric cryptography

Blockchain technology makes it possible to solve business problems in ways that were previously impossible.  A major enabler of this is the decentralization

Security of the PKI ecosystem

Public Key Infrastructure (PKI) is the backbone of trust for many systems on the Internet.  One of the most common uses of PKI is the HTTPS protocol, which p

Elliptic curve cryptography

As its name suggests, elliptic curve cryptography (ECC) uses elliptic curves (like the one shown below) to build cryptographic algorithms.  Because of the fe

Methods for attacking full disk encryption

Full disk encryption is part of cryptography that uses mathematical structures and operators. Cryptography and cryptanalysis functions are used in modern sof

Introduction to Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) uses mathematical structures and operators. Cryptography and cryptanalysis functions are us

Introduction to the TLS/SSL cryptography protocol

SSL stands for Secure Socket Layer. First version of SSL was developed by Netscape in 1995. SSL is the industry standard to establish secure internet connect

Introduction to Diffie-Hellman Key Exchange

Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data fr

Introduction to the Rivest-Shamir-Adleman (RSA) encryption algorithm

Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data fr