Cryptography

Cryptography Fundamentals, Part 2 – Encryption

Encryption These are the main types of encryption. Symmetric Encryption: A single key is used to encrypt and decrypt the message sent between two parties. Sy

Cryptography Fundamentals – Part 1

Introduction In this mini-course, we will learn about various aspects of cryptography. We'll start with cryptography objectives, the need for it, various typ

TrueCrypt Security: Securing Yourself against Practical TrueCrypt Attacks

The need to defend confidentiality of our sensitive information against persistently rising cyber threats has turned most of us toward using encryption on a

Quantum Cryptography

"Quantum cryptography uses photons and physics to generate cryptographic keys" What is quantum cryptography?[pkadzone zone="main_top"] Quantum cryptography i

Broken cryptography

In this article, we will discuss broken cryptography in Android applications. Broken cryptography attacks come into the picture when an app developer wants t

Steganalysis: your X-Ray vision through hidden data

Steganography is often mistaken with cryptography, but they are very different in their operations. The major similarity between them is they were coined

Data Backups with Bacula: Backup Encryption

Introduction Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage. Since the file daemon encrypts

PGP Alternatives for Email Encryption

A few weeks ago, I wrote an article for 2600 Magazine. (If you're curious, publication has been confirmed and you'll probably see it in the Winter 2014-2015

How cybercrime exploits digital certificates

What is a digital certificate? The digital certificate is a critical component of a public key infrastructure. It is an electronic document that associates

Windows Cryptography API

Microsoft Windows provides a sleek API for cryptographic purposes. It is a generic interface for accessing cryptographic services provided by Microsoft Windo