Demonstration of using OpenSSL to create RSA public/private key pair, sign and encrypt messages using those keys, and then decrypt and verify the received messages. Commands used: OpenSSL. Created by Steven Gordon on 7 March 2012 at Sirindhorn International Institute of Technology, Thammasat University, Thailand. Using the RSA algorithm, RSA […]
Devamını Oku
Theoretical Foundations of Cryptography: From MD5 to SHA-2 Understanding CryptographyCryptography is the art of secure communication. It involves transforming data to prevent unauthorized access. Over the years, various algorithms have emerged. Let’s delve into a few popular ones. MD5: An OverviewMessage Digest Algorithm 5 (MD5) was once a favorite. It […]
Devamını Oku
In this video, we will learn how to generate an SSL/TLS certificate signing request (CSR) and have it signed by a Certificate Authority (CA). We won’t submit the CSR to a real CA for this tutorial. Instead, we will play both the certificate authority and the certificate applicant. We will […]
Devamını Oku
We have broken SHA-1 in practice. This industry cryptographic hash function standard is used for digital signatures and file integrity verification and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories, and software updates. It is now practically possible to craft two colliding […]
Devamını Oku
SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and is used for hashing data and certificates. A hashing algorithm shortens the input data into a more diminutive form that cannot be understood using bitwise operations, modular additions, and compression functions. You may be wondering, can […]
Devamını Oku
What is a digital signature? This walkthrough demonstrates how to create a private key, public key, digitally sign a document, and verify. A digital signature and signing are critical concepts in cryptography and information security. Digital Signature: Signing (in Cryptography): Advantages of Digital Signatures: In the digital world, digital signatures […]
Devamını Oku
For some projects , I am using Bouncy Castle’s libraries. I am sharing information about Bouncy Castle . The Bouncy Castle APIs currently consist of the following: www.bouncycastle.org
Devamını Oku
This tutorial shows how to use OpenSSL in Linux systems (Kali in the video) for symmetric and asymmetric encryption and decryption. OpenSSL is a free and open-source toolkit that provides a robust, commercial-grade, full-featured toolkit for general-purpose cryptography and secure communication. Internet servers, including most HTTPS websites, widely use it. […]
Devamını Oku
Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in […]
Devamını Oku
By using math and cryptography, Blockchain is challenging the status quo in a radical way. Will governments and financial institutions embrace it?
Devamını Oku