Are all categories of assymetric key generation applicable to all categories of assymetric key exchange?

Context assumption and aim: Using asymmetric crypto to help Alice and Bob (members belonging to the same basketball club. The club has its own servers) to communicate together without the conversation being intercepted/modif… Continue reading Are all categories of assymetric key generation applicable to all categories of assymetric key exchange?

Why are hardware based random number generators considered better than software based generators?

Hardware based random number generators (RNG) get their randomness from the noise around. Software based generators get this usually from user input, like moving the mouse over a screen (like TrueCrypt does).

What makes hard… Continue reading Why are hardware based random number generators considered better than software based generators?