Encryption Algorithm With Separate One-Way (Hashing) And Two-Way (Decryption) Keys

In cryptography, generally we have two ways of handling sensitive information.
We can use one-way encryption such as hashing. This is useful when we never need to retrieve it again. In this case, we can know if we found the right password,… Continue reading Encryption Algorithm With Separate One-Way (Hashing) And Two-Way (Decryption) Keys

What is the purpose of using different hash algorithm to detect file changes [duplicate]

Take an example of AIDE (Advanced Intrusion Detection Environment), it has a capability to scan system file changes based on checksum.
So in AIDE you can see it has this kind of configuration setting in /etc/aide/aide.conf that we can set … Continue reading What is the purpose of using different hash algorithm to detect file changes [duplicate]

One-way cryptographic algorithm with distinct output and verifiable property

I’m working on a API which is serving content based on user requests. What I’d like to achieve is as follows: Having a constant key stored both on the server and the client machine (as a means of identifying a specific user) I’d like to be… Continue reading One-way cryptographic algorithm with distinct output and verifiable property

Adding AI/ML to Mobile Security

Many organizations are turning to artificial intelligence (AI) and machine learning (ML) to boost their cybersecurity systems, but you mostly hear about how AI is used to monitor networks and perform the time-consuming tasks that are overwhelming for … Continue reading Adding AI/ML to Mobile Security