Recent Posts
-
June 01, 2019
Introduction to cryptography
Cryptography is the science of secret writing so that only the intended recipient can interpret it while others may be seeing it.
-
June 01, 2019
Key Based Cipher Types
There are 2 broad types of key based Ciphers - Symmetric and Asymmetric Key based ciphers
-
June 01, 2019
Symmetric Key Cipher
Symmetric key ciphers use the same secret key for both encryption and decryption. The following sections should give you a logical view of how it works.
-
June 01, 2019
Asymmetric Key Cipher
Asymmetric key ciphers use a mathematically linked key pair(public/private key) for encryption/decryption. Data encrypted using the public key can be decrypted only using the corresponding private key. Data encrypted using the private key can be decrypted only using the corresponding public key. The following sections should give you a logical view of how it works.
-
June 01, 2019
Public Key Infrastructure
Public key infrastructure(PKI) is a set of roles, policies and processes which are essential to facilitate Asymmetric key cryptography. PKI allows mapping public keys to users/entities and provides an ability to verify the public key offline.
-
June 01, 2019
Hybrid Crypto System
There are pros and cons with each key cipher type and so we cannot just choose to use one type over another.
-
June 01, 2019
SSL/TLS - A Hybrid Crypto System
SSL is used to secure network communication. It uses a hybrid cypto model leveraging symmetric and asymmetric ciphers.
-
June 01, 2019
HSM & Key Management
Secret keys should not be stored on servers, databases, file systems or in application software. They should also not be stored in memory on servers that contain other applications. Any secret key that is stored in a weak medium defeats its purpose. Organizations use HSMs to generate & store their secrets keys and for associated crypto processing.