Does this seem like a secure way to transfer wireless data from a keyboard to a host?

I’m making an adapter to convert a wired keyboard I have into a wireless keyboard. I am going to use nRF2401 modules for wireless with some STM32 microcontrollers. I’m trying to come up with a method that will prevent playback attacks and … Continue reading Does this seem like a secure way to transfer wireless data from a keyboard to a host?

How to use another SSL certificate for DHE-RSA while I already have one with domain?

I’m working in IOT team to build a web based IOT system.
I’m using Dataplicity’s Wormhole to host my nodeJS app on raspberry pi. I want to use DHE-RSA symmetric key encryption channel for sending/receiving data from client to server and vi… Continue reading How to use another SSL certificate for DHE-RSA while I already have one with domain?

Can a secure key-exchange algorithm replace hashing for password authentication?

Over the weekend I was thinking about the problem of scaling various web services. One common practice to scale authorization is to use cryptographically signed tokens. This way when a request comes into your service you don’t need to look… Continue reading Can a secure key-exchange algorithm replace hashing for password authentication?

how to encrypt and decrypt messages with more than one sender and more than one receiver?

I am creating a chat app. This app contains private messages and channels. These channels include more than one user.
I want to encrypt messages using AES and to transfer the AES key to users of this channel.
I need a secure transport chan… Continue reading how to encrypt and decrypt messages with more than one sender and more than one receiver?