Cryptography

Cryptographic algorithms lab

For this lab we'll be using GPG, OpenSSL to demonstrate symmetric and asymmetric encryption/decryption and MD5, SHA1 to demonstrate hash functions. Virtua

Encryption Everywhere?

This article discusses opportunistic encryption (OE) and ways to set up systems so that they will automatically encrypt whenever they can, rather than just w

LibreSSL: The Secure OpenSSL Alternative

This paper seeks to compare OpenSSL and LibreSSL as the main encryption library for production environments

The Perils of Inadequate Key Size in Public Cryptosystems

A public-key cryptosystem is an asymmetric cryptosystem where the public key and the private key form a mathematically related key pair. The public key acts

Tunneling, Crypto and VPNs

1. Introduction The idea of Virtual Private Network (VPN) is to simulate a private network over a public network. A VPN tunnel can be used to securely connec

DNA cryptography and information security

What is cryptography? Cryptography is the science of study of secret writing. It helps in encrypting a plain text message to make it unreadable. It is a ver

Encryption Solutions for the New World

Keeping personal information secure and protected remains a top priority for computer users who now rely heavily on information systems to manage a large par

Cryptography Fundamentals, Part 5 – Certificate Authentication

Certificate Authentication Here's how to verify that the certificate is from the original sender with GnuPG. [download]Download the Cryptography Fundamentals

Cryptography Fundamentals, Part 4 – PKI

PKI PKI (public key infrastructure) is a hybrid of symmetric and asymmetric encryption. The handshake uses asymmetric encryption to exchange the secret key

Cryptography fundamentals, part three - Hashing

Hashing A hash value, also called a message digest, is a number generated from a string of text. As per the hash definition, no two different texts should p