Digital Signature
Today’s world is a digital world. A place of online meetings, virtual conferences, cloud-stored documents, and… digital signatures.
Today’s world is a digital world. A place of online meetings, virtual conferences, cloud-stored documents, and… digital signatures.
In one of the previous blogs and on a recent PQC webinar we have discussed the public-key cryptography’s vulnerability to quantum attacks, specifically to attacks relying on Shor’s algorithm.
In September 2020 Secura published an article disclosing a vulnerability in Windows Server (all known versions) Netlogon Remote Protocol. This vulnerability is known as CVE-2020-1472 or more commonly, Zerologon.
What is entropy and why do we need it in security and cryptographic systems?
The number of data breaches and security threats has been steadily increasing for years.
Blockchain is a system of recording information that makes it impossible to change, cheat or hack the system.
In the previous blogs we have briefly touched upon how resistant symmetric and asymmetric cryptography are against quantum attacks. Here we discuss the topic in more depth.
Utimaco successfully completed its acquisition of the Atalla payment Hardware Security Module (HSM) and Enterprise Secure Key Manager (ESKM) product lines from Micro Focus in November 2018. This strategic acquisition has positioned Utimaco as the second-largest hardware security module (HSM) manufacturer in the world and has createed the most comprehensive HSM offering on the market.
We can roughly divide encryption algorithms into symmetric and asymmetric ones. Symmetric ones have a longer history. It can be said that they have over 2000 years of history and development. The concept of asymmetric or public-key cryptography, on the other hand, was developed in 1970s and first publicly published in 1977 by Whitfield Diffie and Martin Hellman, researchers at Stanford University.
When talking about symmetric cryptography we have in mind cryptographic algorithms enabling communication between a sender and a receiver. Both of them use the same cryptographic key for encryption and decryption.