Archives for encryption - Page 2
CSR , TBSCertificate and Private Keys
Do I need to send (or even possess) a private key to request an SSL Certificate? Believe it or not, no - you do not need to even possess the…
Tokenized Identity Use Cases
If a physical token ( , Passport) is used to prove identity, it is secure. When we move to digital tokens, it becomes a little easier to 'lease' your identity.…
Brute Force Breaking of Encryption – Solution Scheme
One of the more interesting approaches to preventing brute force cracking is to actually use MULTIPLE private keys that all map to the SAME public key. Now, only ONE of…
Encryption and Signing – Same Key Pair – or different key pairs?
Most articles and even textbooks assume that the same key pair will be used for encryption as for signatures. However, there is absolutely no reason this has to be the…
Dr.Tatsuaki Okamoto as the motivator behind the moniker – Satoshi Nakamoto
How could someone not have a digital footprint? It is near impossible for anyone in the computer world to be completely off the grid. Hal Finney's Neighbor Hal Finney's neighbor…
Hashing PII Data
Also read PCI DSS Compliance on GCP and PCI Compliance Services on AWS Hashing is never a great option for PII data (even less so for PCI data). For instance,…
Troubleshooting SSL certificates
Also read SSL Certificate Basics Is SSL active? SSL Checker SSL Checker Validation Methods - DNS vs HTTP SSL Labs: SSL Labs is most helpful for cryptographic issues on an…
RSA public and private key lengths
The Modulus defines the length An RSA key length is the length, in bits, of the modulus. An RSA key that has length "2048", is generated from a modulus that…
Secrecy versus Privacy in RSA based Schemes
RSA is a scheme that can be used for two purposes. Secrecy - Encrypting in transit data - Data Encryption. This is the basis for all certificate based data encryption…
SSL and TLS Certificate Basics
What IS a Certificate? (Also read, Web Server Considerations for Hosting SSL Certificates ) It is a mapping of an entity name (organization or individual) to a PUBLIC KEY. How…