Use Cases for Fully Homomorphic Encryption Within an Organization

I would like to know if and what are the practical use-cases for Fully Homomorphic Encryption within an organization?
I understand that FHE allows you to delegate processing of data without giving away access to it. This is good if you wan… Continue reading Use Cases for Fully Homomorphic Encryption Within an Organization

How can I use PBKDF2 to derive an encryption key from a password and then access that key later without the password (i.e. with a cookie)?

I’m developing a notetaking app that will store users’ note and file data encrypted in a db and on backblaze (respectively). The app will not be end-to-end encrypted but data will be encrypted in transit (with TLS) and at rest (AES256, for… Continue reading How can I use PBKDF2 to derive an encryption key from a password and then access that key later without the password (i.e. with a cookie)?

BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user’s phone. I’m very new to these technologies, and was w… Continue reading BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user’s phone. I’m very new to these technologies, and was w… Continue reading BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

Microsoft Is Adding New Cryptography Algorithms

Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article:

The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously known as CRYSTALS-Kyber, ML-KEM is one of three post-quantum standards formalized last month by the National Institute of Standards and Technology (NIST). The KEM in the new name is short for key encapsulation. KEMs can be used by two parties to negotiate a shared secret over a public channel. Shared secrets generated by a KEM can then be used with symmetric-key cryptographic operations, which aren’t vulnerable to Shor’s algorithm when the keys are of a sufficient size…

Continue reading Microsoft Is Adding New Cryptography Algorithms

How does the key distribution center (KDC) distribute the session key in symmetric ecryption?

When A communicates with B using third party KDC:

A issues a request to the KDC for a session key; the message includes the identity of A and B and a nonce, N1.
KDC responds with a message encrypted using key (Ka); the message includes th… Continue reading How does the key distribution center (KDC) distribute the session key in symmetric ecryption?