Most Used Categories

Computer Science , Learn Cryptography

Public Key Infrastructure

Public Key Infrastructure, The most distinct feature of Public Key Infrastructure (PKI) is that it uses a pair of keys to achieve the underlying security service. The key pair comprises o…Read More

Computer Science , Learn Cryptography

Message Authentication

Message Authentication, In the last chapter, we discussed the data integrity threats and the use of hashing technique to detect if any modification attacks have taken place on the data…Read More

Computer Science , Learn Cryptography

Triple DES

Triple DES, The speed of exhaustive key searches against DES after 1990 began to cause discomfort amongst users of DES. However, users did not want to replace DES as it tak…Read More