Keeping Secrets: Select a Cipher

So you want to encrypt your sensitive information to protect its confidentiality. Good! But exactly how should this be done? There are many ciphers (or encryption algorithms) to choose from. Let’s see what choices are available. Splitting the Choices Selecting a cipher is like sharing bread with your friend. Wait. What? Let’s say you want […]
Read More ›

Good News: There are New Crypto Options for Digital Certificates!

Digital certificates, and therefore the security of network communication, rely on both cryptographic hash functions and the cipher algorithms used for encrypting and decrypting data. They are crucial for two stages of security. First, for the user to verify the identity of the web server before giving up their login and password, and therefore access […]
Read More ›

Type to search

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.