What is Salting?

Password salting adds additional characters to passwords before hashing them, and prevents many types of attacks, including dictionary, brute force, and rainbow table attacks. In cryptography, a salt is random data that is used as an additional input to a one-way function that “hashes” a password or passphrase. Salts are closely related to the concept […]

Read More

What is Diffie Hellman?

Diffie Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES. The algorithm in itself is very simple.

Read More

What is a Digital Certificate?

In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document used to prove ownership of a public key.

Read More

What is PKI?

A Public Key Infrastructure (PKI) is a group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. A PKI allows two entities to privately share symmetric keys without any prior communication.

Read More

Using Cryptographic Protocols

When using digital signatures with email: The sender’s private key encrypts (or signs). The sender’s public key decrypts. A digital signature provides authentication (verified identification) of the sender, nonrepudiation, and integrity of the message. Senders create a digital signature by hashing a message and encrypting the hash with the sender’s private key. Recipients decrypt the […]

Read More

Cryptographic Algorithms and Protocols

Name Type Algorithm Method Key Size Strength Replaced By DES Symmetric 64-bit block cipher 64 bit (56 + 8 parity) 56-bit encryption keys Very weak 3DES 3DES Symmetric 64-bit block cipher 192 bit (168 bit + 24 parity) Moderate AES Blowfish Symmetric 64-bit block cipher 32- to 448-bit key AES Symmetric 128-bit block cipher 128-bit […]

Read More