Cryptography

Attacking cryptography

August 2, 2016 Cryptography

Cryptographic systems are mostly vulnerable to brute-force attacks. In this attack many combinations of characters tried in an attempt to uncover valued key.

(more…)

Symmetric vs Asymmetric Cryptography

July 28, 2016 Cryptography

Cryptography applies to different technologies, some examples of cryptography include:
Digital certificates
Authentication
PKI
RSA
PGP
(more…)