Keeping Secrets: Select a Cipher
So you want to encrypt your sensitive information to protect its confidentiality. Good! But exactly how should this be done? There are many ciphers (or encryption algorithms) to choose from. Let’s see what choices are available. Splitting the Choices Selecting a cipher is like sharing bread with your friend. Wait. What? Let’s say you want […]
Good News: There are New Crypto Options for Digital Certificates!
Digital certificates, and therefore the security of network communication, rely on both cryptographic hash functions and the cipher algorithms used for encrypting and decrypting data. They are crucial for two stages of security. First, for the user to verify the identity of the web server before giving up their login and password, and therefore access […]