cryptography

Indistinguishability Obfuscation

Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and…

2 weeks ago

The ultimate guide to encryption key management

Introduction In cryptography, a key is a very important piece of information used to combine with an algorithm (a cipher)…

2 months ago

DiceKeys

DiceKeys is a physical mechanism for creating and storing a 192-bit key. The idea is that you roll a special…

3 months ago

4 Steps to Prepare for Quantum Computing

A scientist at Los Alamos National Laboratory recently asked an important question: “When full-fledged quantum computers arrive, will we be…

4 months ago

Update on NIST’s Post-Quantum Cryptography Program

NIST has posted an update on their post-quantum cryptography program: After spending more than three years examining new approaches to…

5 months ago

Security risks of outdated encryption: Is your data really secure?

Introduction They say that those who fail to learn history are doomed to repeat it. A salient factor in the…

5 months ago

Modernizing Your PKI Infrastructure | Keyfactor

Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed.

5 months ago

1 Billion Reasons to Manage Cryptographic Keys | Keyfactor

Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master…

6 months ago

When to Use Symmetric vs. Asymmetric Encryption | Keyfactor

Most people today are familiar with the basic idea of cryptography -- encrypting a message to secure it so that…

6 months ago

BSides Tampa 2020 – David Dillard’s ‘Track B 02 – Practical Crypto Review For Developers’

Many Thanks to Adrian Crenshaw (AKA Irongeek), his Videographer Colleagues and the Presenters for Sharing Their Outstanding Videos Of BSides…

6 months ago