Cryptography: What is secure?

By Willy Jiang

As we moved into the information society, cryptography has become increasingly used to provide security. What is secure today can be broken tomorrow or be broken by something or somehow. This rule could just be the only rule that never changes in the ever-changing game of security. It is thus important for security personals to know more than just applying cryptography blindly

» Read more

Formulating a National Cryptography Policy: Relevant Issues, Considerations and Implications for Sin

By Francis Goh

This paper provides an insight into the relevant issues, considerations and implications necessary for formulating an effective National Cryptography Policy that would be able to balance a number of varied interests by taking into account the protection of privacy, intellectual property, business and financial information, as well as the needs for law enforcement and national security. An analysis of Singapore’s present Cryptography Policy is also carried out with due deference to the OECD Guidelines on Cryptography and determines its adequacy in lieu of the issues, considerations and implications covered and makes recommendations for any necessary improvements

» Read more

The Relevance of Quantum Cryptography in Modern Cryptographic Systems

Christoph Guenther

This paper explains the basic principles of quantum cryptography and how these principles apply to quantum key distribution. One specific quantum key distribution protocol called BB84 is described in detail and compared to traditional (nonquantum) cryptographic systems. It is explained how BB84 addresses some of the shortcomings of traditional cryptographic systems. The remaining technical limitations of BB84 are listed. A short overview of commercial implementations of quantum cryptography is given. The paper concludes with a brief discussion of the relevance and future viability of quantum cryptography in today’s information security environment

» Read more

Is the future of cryptography in qubits

By Wayne Redmond

While quantum computer algorithms threaten the future of classical cryptography, One–time pads can still offer security even in the presence of key cracking quantum computers, but the key distribution problem would have to be over come. In a beautiful irony, quantum computers may break current cryptography but quantum mechanics also offer hope to cryptography in quantum key distribution

» Read more

Using Cryptography to Maintain Network Security – Part 6 – InfoSec Resources

By Dalasta Darren

Modules in this short course: Application & Use of Cryptography Cryptographic Life Cycle and Encryption Concepts Key Management Processes Digital Signatures and Non-Repudiation Methods of Cryptoanalytics Attacks Using Cryptography to Maintain Network Security Using Cryptography to Maintain Application Security Public Key Infrastructure Certificate Related Issues Information Hiding Alternatives

» Read more

Using Cryptography to Maintain Application Security – Part 7 – InfoSec Resources

By Dalasta Darren

Modules in this short course: Application & Use of Cryptography Cryptographic Life Cycle and Encryption Concepts Key Management Processes Digital Signatures and Non-Repudiation Methods of Cryptoanalytics Attacks Using Cryptography to Maintain Network Security Using Cryptography to Maintain Application Security Public Key Infrastructure Certificate Related Issues Information Hiding Alternatives

» Read more

Cryptography & Public Key Infrastructure – Part 8 – InfoSec Resources

By Dalasta Darren

Modules in this short course: Application & Use of Cryptography Cryptographic Life Cycle and Encryption Concepts Key Management Processes Digital Signatures and Non-Repudiation Methods of Cryptoanalytics Attacks Using Cryptography to Maintain Network Security Using Cryptography to Maintain Application Security Public Key Infrastructure Certificate Related Issues Information Hiding Alternatives

» Read more

Module 3: Cryptography & Key Management Processes – InfoSec Resources

ByDalasta Darren

Modules in this short course: Application & Use of Cryptography Cryptographic Life Cycle and Encryption Concepts Key Management Processes Digital Signatures and Non-Repudiation Methods of Cryptoanalytics Attacks Using Cryptography to Maintain Network Security Using Cryptography to Maintain Application Security Public Key Infrastructure Certificate Related Issues Information Hiding Alternatives

» Read more

Broken Cryptography

By Srinivas

In this article, we will discuss broken cryptography in Android applications. Broken cryptography attacks come into the picture when an app developer wants to take advantage of encryption in his application. This article covers the possible ways where vulnerabilities associated with broken cryptography may be introduced in Android apps. We will also see some of the ways an attacker can exploit this kind of vulnerability. Broken cryptography in Android apps can be introduced due to various reasons. The two main reasons as mentioned in OWASP Mobile Top 10 Projects are: Using a weak algorithm for encryption/decryption Using a strong encryption algorithm but implementing it in an insecure way

» Read more

1 4 5 6 7