PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4, 20241Mar 4, 20241
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Published inASecuritySite: When Bob Met AliceThe Foundation of Cybersecurity: D3FEND™ 1.0The New “Bible of Cybersecurity”18h ago18h ago
PBKDF2 and Encrypting DataWhat keeps your wireless access point password secure? PBKDF2 (Password-based Key Derivation Function).3d ago3d ago
Published inASecuritySite: When Bob Met AliceExplaining RSA PKCS#1.5, RSA OAEP or RSA PSSLet me start. RSA can be used to encrypt or sign.Jan 121Jan 121
CTR Mode in AESIn its purest form, AES is a block cipher of 128 bits, but most current applications convert it into a stream cipher mode, where we just…Jan 11Jan 11
Published inASecuritySite: When Bob Met AlicePromising Cryptography: JavaScript Promises in EncryptionI remember, in the past, it often happened that Microsoft Windows took longer to boot up with each new version — as it had to check more…Jan 11Jan 11
Finally, Encryption By Default In Healthcare?We live is a still world of data. For nearly five decades, we have had the tools to properly protect data in all its states, but still, we…Jan 92Jan 92
Published inASecuritySite: When Bob Met AliceCreating Ed25519 Signing Keys: Random or from a PassphraseWhile Bitcoin and Ethereum use the secp256k1 curve and the ECDSA signature, there is a much better signature method. This is EdDSA, and…Jan 5Jan 5
Published inASecuritySite: When Bob Met AliceAuthenticated Encryption with Box and JavaScriptWe — as a cybersecurity industry — have possibly let down citizens. Why? Well, we still send unauthenticated messages to each other, and…Jan 4Jan 4