What are the differences between the RSA, DSA, and ECDSA keys that SSH uses?

In my /etc/ssh/ directory, I can see three keys which contains three different types of ssh keys:
-rw——- 1 root root 607 Oct 4 22:43 ssh_host_dsa_key
-rw-r–r– 1 root root 623 Oct 4 22:43 ssh_host_dsa_key.pub
-rw——- 1 root… Continue reading What are the differences between the RSA, DSA, and ECDSA keys that SSH uses?

Can an attacker replace the hash of a download, a download, and the public key?

I have a question about DSA and GPG. Suppose you are trying to verify a downloaded file is ‘legit’ (i.e., no malicious code and it is the intended file). I’ll just use Ubuntu’s 16.04 LTS ISO image as an example. Following through the instr… Continue reading Can an attacker replace the hash of a download, a download, and the public key?