Keeping Secrets: Setting a Cipher Mode

Earlier this week we considered ways to split the many choices of ciphers (or encryption algorithms): symmetric versus asymmetric, and block versus stream. The block symmetric ciphers do the heavy lifting, they are used for large data sets. But one block symmetric cipher can be operated in various modes, and the selection of mode depends […]
Read More ›

Hotel Security and the Internet of Things

The Hilton chain of hotels, a total of 11 brands, is rapidly increasing the degree to which customers can use their smart phones not only as reservation tools but as keys. They have announced that guests will, by the end of this year, be able to use their smart phones to select their room at […]
Read More ›

Is Your Wi-Fi Router a Chameleon?

Most of us have some kind of anti-virus and intrusion detection system on our home and business computers. (If you don’t, you should!) These systems work to prevent intrusions on our systems. We run them on workstations and servers and trust them to protect our networks against certain types of threats. But our embedded systems […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.