Does public key cryptography provide any security advantages, or even just a different security model, over symmetric cryptography?

Lets say Bob wishes to communicate with Alice.
Alice’s public key is useless to Bob unless he can prove that the public key came from Alice. To do this, Bob and Alice can establish a secure channel to exchange Alice’s the public key, but t… Continue reading Does public key cryptography provide any security advantages, or even just a different security model, over symmetric cryptography?

Practicalities, implementation, and weaknesses of simple symmetric encryption for plain text files

For about 20 years, I’ve been using gnupg to encrypt a plain-text file containing my passwords. (The actual per-site passwords are generated using a hash function.) It’s worked OK for me, but gnupg is a very heavy-weight system that’s real… Continue reading Practicalities, implementation, and weaknesses of simple symmetric encryption for plain text files

What is the best way to protect public keys sitting on server against MITM attack with this zero-trust & end-to-end secure structure? [closed]

This one is a handful to describe. I’ve got on offline first stricture, server is only used for client database sync. This is a zero-trust structure. I don’t care how secure my BaaS provider is, how secure my server is or who my threat act… Continue reading What is the best way to protect public keys sitting on server against MITM attack with this zero-trust & end-to-end secure structure? [closed]