Keeping Secrets: Setting a Cipher Mode
Earlier this week we considered ways to split the many choices of ciphers (or encryption algorithms): symmetric versus asymmetric, and block versus stream. The block symmetric ciphers do the heavy lifting, they are used for large data sets. But one block symmetric cipher can be operated in various modes, and the selection of mode depends […]
Hotel Security and the Internet of Things
The Hilton chain of hotels, a total of 11 brands, is rapidly increasing the degree to which customers can use their smart phones not only as reservation tools but as keys. They have announced that guests will, by the end of this year, be able to use their smart phones to select their room at […]
Is Your Wi-Fi Router a Chameleon?
Most of us have some kind of anti-virus and intrusion detection system on our home and business computers. (If you don’t, you should!) These systems work to prevent intrusions on our systems. We run them on workstations and servers and trust them to protect our networks against certain types of threats. But our embedded systems […]