Blog Posts Tagged with "Public Key Encryption"

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain 4: Cryptography

March 28, 2012 Added by:Javvad Malik

Cryptography, the dark art of information security. The deus-ex-machina, the silver bullet, the be all and end all of all security measures, so profound cryptography was first classed as a munitions. Widely misunderstood, often poorly implemented...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Subordinate Digital Certificates Pits Trustwave vs Mozilla

February 14, 2012 Added by:Pierluigi Paganini

Trustwave declared that the issuing of subordinate root certificates to private companies was done to allow inspection of the SSL encrypted traffic that passes through their networks. Trustwave decided to stop issuing these in the future, and revoked the existing ones...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How to Encrypt Your Email with PGP

February 06, 2012 Added by:Robert Siciliano

Pretty Good Privacy (PGP) “is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions..."

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

The Emerging Threat to Public-Key Encryption

January 26, 2012 Added by:Alan Woodward

We are now entering a new era where we have programmable, relatively inexpensive, small, quantum computers visible on the horizon, and we know that such computers have the potential to undermine the mathematics upon which current public-key encryption depends...

Comments  (0)