Why do we need certificates at all in PKI?
The public key that is used to send someone a message (for example - if someone wants to send me a message, they will use my public key - so…
Diffie Helman, Symmetric and Asymmetric Encryption
Symmetric Encryption has two potential drawbacks. The first of these is the commonly known Man in the Middle attack. The second is a limitation on reuse. Man in the Middle…
Group Encryption Keys
This content is password protected. To view it please enter your password below: Password:
Brute Force Breaking of Encryption – Solution Scheme
One of the more interesting approaches to preventing brute force cracking is to actually use MULTIPLE private keys that all map to the SAME public key. Now, only ONE of…
Encryption and Signing – Same Key Pair – or different key pairs?
Most articles and even textbooks assume that the same key pair will be used for encryption as for signatures. However, there is absolutely no reason this has to be the…
Tokenization versus Encryption vs Data Masking
Tokens are pointers to data - and substitute data (not transform it) Tokenization Pros Use Cases - PCI Data - Credit Card info etc. Tokenization reduces the in-house responsibility of…