cryptography
Indistinguishability Obfuscation
Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and saying that it had finally been achieved, based on a recently published ...
The ultimate guide to encryption key management
Introduction In cryptography, a key is a very important piece of information used to combine with an algorithm (a cipher) to transform plaintext into ciphertext (encryption). The first step of preventive security ...
DiceKeys
DiceKeys is a physical mechanism for creating and storing a 192-bit key. The idea is that you roll a special set of twenty-five dice, put them into a plastic jig, and then ...
4 Steps to Prepare for Quantum Computing
A scientist at Los Alamos National Laboratory recently asked an important question: “When full-fledged quantum computers arrive, will we be ready?” This scientist researches quantum information theory and his opinion piece for ...
Update on NIST’s Post-Quantum Cryptography Program
NIST has posted an update on their post-quantum cryptography program: After spending more than three years examining new approaches to encryption and data protection that could defeat an assault from a quantum ...
Security risks of outdated encryption: Is your data really secure?
Introduction They say that those who fail to learn history are doomed to repeat it. A salient factor in the defeat of Austria by Prussia in the 1866 Austro-Prussian war was the ...
Modernizing Your PKI Infrastructure | Keyfactor
Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed ...
1 Billion Reasons to Manage Cryptographic Keys | Keyfactor
Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master keys used to protect the banks systems. The result: 25,000 fraudulent charges ...
When to Use Symmetric vs. Asymmetric Encryption | Keyfactor
Most people today are familiar with the basic idea of cryptography -- encrypting a message to secure it so that it’s not readable to anyone and everyone ...
BSides Tampa 2020 – David Dillard’s ‘Track B 02 – Practical Crypto Review For Developers’
Many Thanks to Adrian Crenshaw (AKA Irongeek), his Videographer Colleagues and the Presenters for Sharing Their Outstanding Videos Of BSides Tampa 2020. Visit Irongeek for additional production credits and important information. Subscribe ...

