Tech Notes

Recent Posts

  • June 01, 2019

    Introduction to cryptography

    Cryptography is the science of secret writing so that only the intended recipient can interpret it while others may be seeing it.

  • June 01, 2019

    Key Based Cipher Types

    There are 2 broad types of key based Ciphers - Symmetric and Asymmetric Key based ciphers

  • June 01, 2019

    Symmetric Key Cipher

    Symmetric key ciphers use the same secret key for both encryption and decryption. The following sections should give you a logical view of how it works.

  • June 01, 2019

    Asymmetric Key Cipher

    Asymmetric key ciphers use a mathematically linked key pair(public/private key) for encryption/decryption. Data encrypted using the public key can be decrypted only using the corresponding private key. Data encrypted using the private key can be decrypted only using the corresponding public key. The following sections should give you a logical view of how it works.

  • June 01, 2019

    Public Key Infrastructure

    Public key infrastructure(PKI) is a set of roles, policies and processes which are essential to facilitate Asymmetric key cryptography. PKI allows mapping public keys to users/entities and provides an ability to verify the public key offline.

  • June 01, 2019

    Hybrid Crypto System

    There are pros and cons with each key cipher type and so we cannot just choose to use one type over another.

  • June 01, 2019

    SSL/TLS - A Hybrid Crypto System

    SSL is used to secure network communication. It uses a hybrid cypto model leveraging symmetric and asymmetric ciphers.

  • June 01, 2019

    HSM & Key Management

    Secret keys should not be stored on servers, databases, file systems or in application software. They should also not be stored in memory on servers that contain other applications. Any secret key that is stored in a weak medium defeats its purpose. Organizations use HSMs to generate & store their secrets keys and for associated crypto processing.