Cryptography

Introduction to full disk encryption

Encryption is the process of converting plaintext to encrypted text. Encrypted text hides the original data from unauthorized users since encrypted text cann

8 reasons you may not want to use VPNs

You probably have heard about VPNs before. It’s even possible that you might have used one. In this post, we will be learning about VPN, some of its basic co

Rivest Cipher 4 (RC4)

RC4 stands for Rivest Cipher 4. RC4 is a stream cipher and was invented by Ron Rivest in 1987. Since RC4 is a stream cipher, it encrypts the stream of data b

Understanding stream ciphers in cryptography

Stream ciphers fall under the symmetric encryption category. Thus, using stream ciphers the sender and the recipient of the data use the same key to encrypt

Cryptography Errors

Many organizations make use of cryptography for securing their applications. A large portion of banking applications rely on some sort of cryptography. When

Understanding block ciphers in cryptography

Block ciphers fall under the symmetric encryption category. Thus, using block ciphers the sender and the recipient of the data use the same key to encrypt an

How to mitigate Credential Management Vulnerabilities

Introduction In the previous articles about credential management, we discussed how credentials can be used in applications and what can go wrong when deali

How To Exploit Credential Management Vulnerabilities

Introduction In the previous article, we discussed some examples of poor credential management. Hardcoded credentials, improper error handling and insecure

Poor Credential Management

Introduction As discussed in the previous article, use of credentials is one of the most common approaches used in applications and this is the de facto met

How Is Cryptography Used In Applications?

Introduction Cryptography is used in software to protect the data from adversaries. The key principles of cryptography is to provide confidentiality, integr