Archives for Security
Cryptanalysis and Attacks on Cryptosystems
Cryptanalysis is the art of deciphering encrypted communications without knowing the proper keys. There are many cryptanalytic techniques. Some of the more important ones for a system implementor are described…
Strength of Cryptographic Algorithms
Good cryptographic systems should always be designed so that they are as difficult to break as possible. It is possible to build systems that cannot be broken in practice (though…
Cryptographic Random Number Generators
Cryptographic random number generators generate random numbers for use in cryptographic applications, such as for keys. Conventional random number generators available in most programming languages or programming environments are not…
Cryptographic Hash Functions
Cryptographic hash functions are used in various contexts, for example, to compute the message digest when making a digital signature. A hash function compresses the bits of a message to…
Digital Signatures
Some public-key algorithms can be used to generate digital signatures. A digital signature is a small amount of data that was created using some private key, and there is a…
Basic Cryptographic Algorithms
The method of encryption and decryption is called a cipher. Some cryptographic methods rely on the secrecy of the encryption algorithms; such algorithms are only of historical interest and are…
Cryptography
CRYPTOGRAPHY (from Gr. Kpinrros, hidden, and ypiL4aI, to write), or writing in cipher, called also steganography (from Gr. crreyvij, a covering), the art of writing in such a way as…
A Brief History of Cryptography – compiled by Shireen Hebert
Cryptography, the science of encrypting and decrypting information, dates as far back as 1900 BC when a scribe in Egypt first used a derivation of the standard hieroglyphics of the…
Cryptography: History
"It was the amateurs of cryptology who created the species. The professionals, who almost certainly surpassed them in cryptanalytic expertise, concentrated on down-to-earth problems of the systems that were then…
Introduction to Cryptosystems
Cryptology is the hiding of information so that it is unintelligable to those we do not wish to read it and intelligable to those we do. In this section we…
Introduction to SSL certificates
What is a SSL certificate? A SSL certificate provides a means of vouching for your web site's integrity and authenticity. If your site requires a secure section, you want people…
Where should I get my SSL Certificate?
Though there are a large number of entities selling secure certificates, there are primarily 6 major SSL certificate providers. Whoever you purchase your SSL certificate from will most likely be…
What is SSL? And how can I use it?
What is SSL? And how can I use it? SSL stands for Secure Sockets Layer. What this means in plain language is that when a Internet Browser connects to a…
MIDP Application Security 2: Understanding SSL and TLS
Transport Layer Security (TLS) is a protocol that enables authentication and data encryption over insecure networks. It is implemented as a layer between TCP/IP and higher-level network protocols like HTTP,…
What is SSL (the „little padlock”)?
SSL (“Secured Socket Layer”) is a protocol used to encrypt the communication between the user's browser and the web server. When SSL is active, a “little padlock” appears on the…
What is SSL?
The SSL (Secure Sockets Layer) Handshake Protocol was developed by Netscape Communications Corporation to provide security and privacy over the Internet. The protocol supports server and client authentication. The SSL…
RSA Security and GeoTrust Announce Strategic Partnership to Offer Digital Certificate Solutions
RSA Security and GeoTrust help customers needing low-cost, SSL server certificates to receive them quickly and easily compared to other managed service providers BEDFORD, Mass. & WELLESLEY, Mass. — May…
How do I generate a Certificate Signing Request (CSR) for my web server?
For detailed instructions on the different web servers and how to create the Certificate Signing Requests (CSR's) for server certificates, please proceed to the following URL: Select your server software…
ATM industry prepares to secure its new windows-based ATMs
The Global ATM Security Alliance (GASA) () has published its international best practices for ATM Cyber Security as the ATM industry enters its cyber era, due to the twin migrations…
Gibson 1, Microsoft 0
Computer security celebrity Steve Gibson won his long battle with Microsoft over "raw sockets." It took three years for the folks in Redmond to finally cave in to his media…