Transmit over CAN-FD a RSA-ecrypted and signed message, how to deal with message lenght?

As said in the title, I’ve to encrypt a message with RSA, generate a signature, and transmit everything over CAN-FD (suppose keys are already been exchanged). The problem is that a CAN-FD frame supports a total of 64 bytes of payload, but … Continue reading Transmit over CAN-FD a RSA-ecrypted and signed message, how to deal with message lenght?

Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One

We’ll break down the two main types of encryption — symmetric and asymmetric — before diving into the list of the 5 most commonly used encryption algorithms to simplify them…
The post Types of Encryption: 5 Encryption Algorithms &#… Continue reading Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One

Diffie-Hellman + Asymetric encryption kept simple, or alternatives to TLS [migrated]

I am working on a system that includes our dear friends Alice, Bob, and a server that is only partially trusted. I have spent the majority of the day reading up on various cryptography methods, but I have concluded that I need some help to… Continue reading Diffie-Hellman + Asymetric encryption kept simple, or alternatives to TLS [migrated]

Compare fingerprints of gpg –verify for files download with / without TOR

From my understanding, except we meet the creator of an archive in person and verify the primary key fingerprint, we can never be sure, that the archive we download is really created by the person we think it is.
Therefore gpg warns us th… Continue reading Compare fingerprints of gpg –verify for files download with / without TOR

Is there a secure way to share a secret key to another entity without a use of PKI

My concern is with resource constrained devices with limited resources to perform verification of signatures e.g. RSA signature. What I know is that the asymmetric keys are use to determine that the symmetric key is coming from legitimate … Continue reading Is there a secure way to share a secret key to another entity without a use of PKI