I want to use bitaddress.org to create a wallet. Can you please verify my approach?
Change the password of my router and wifi and unplug all devices from the network except my notebook.
Go to https://github.com/pointbiz/bitaddress.org an… Continue reading Safe usage of bitaddress.org
So if I got this right from my intense research, the following procedure would be preferrable:
Use the PBKDF2 key derivation function to derive a secret key from the users password on the client side.
Use the derived key, which was generat… Continue reading Algorithms when using client side hashing plus server side hashing
The winner of the Best Paper Award at Crypto this year was a significant improvement to lattice-based cryptanalysis.
This is important, because a bunch of NIST’s post-quantum options base their security on lattice problems.
I worry about standard… Continue reading Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms
Can you suggest a relevant topic for a thesis in the specialty of software-secure infocommunications?
The topic could be related to cryptography, software vulnerability analysis, corporate security, VPN, network protocol analysis, or anyth… Continue reading topic for thesis in the specialty software-secure infocommunications [closed]
I am currently working on an open source project to securely store notes, payment card numbers, etc. I would like to implement a zero knowledge encryption method so that no one but the user can decrypt this data.
Unfortunately, I am stuck … Continue reading Securely storing derived key in web app and handling user identity
GCHQ has released new images of the WWII Colossus code-breaking computer, celebrating the machine’s eightieth anniversary (birthday?).
Continue reading New Images of Colossus Released
Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. Unfortunately, this also introduces threats to the digital economy and particularly the financial sector. The Digital Operational Resilience Act (DORA) is a regulatory framework that introduces uniform requirements across the European Union (EU) to achieve a “high […]
The post DORA and your quantum-safe cryptography migration appeared first on Security Intelligence.
Continue reading DORA and your quantum-safe cryptography migration
Quantum computing presents both opportunities and challenges for the modern enterprise. While quantum computers are expected to help solve some of the world’s most complex problems, they also pose a risk to traditional cryptographic systems, particularly public-key encryption. To ensure their organization’s data remains secure now and in the future, chief information security officers (CISOs) […]
The post The CISO’s guide to accelerating quantum-safe readiness appeared first on Security Intelligence.
Continue reading The CISO’s guide to accelerating quantum-safe readiness
I already tried googling but no luck. All search results always tell you how to check cert expiration manually, but that is not my question. Yes I can use OpenSSL for example, but what I am asking is how the SSL/TLS protocol does it, not h… Continue reading How does the SSL/TLS protocol determine if a certificate is expired or not?
Is it a good idea for a user who is the owner of encrypted data to share a secret passphrase with other users (workers) so that they can decrypt the encrypted data? Is there a better way? I’ll add that the data is encrypted on the client s… Continue reading Sharing secret passphrase with others