$100k to Crack a Bitcoin Wallet

When Bitcoin peaked a few years ago, with single coins reaching around $18,000 USD, heartbreaking stories began circulating about people who had tens or hundreds of coins they mined in the early days when coins were worth just a few dollars or cents. Since then, they owners of these coins …read more

Continue reading $100k to Crack a Bitcoin Wallet

What are public and private key pairs and how do they work

Public and private key pairs lie at the core of how we do encryption here at PreVeil. They are the basis for the end-to-end encryption we use as well as asymmetric cryptography in general.   We often find ourselves explaining the concepts of how t… Continue reading What are public and private key pairs and how do they work

DUHK Attack Exposes Gaps in FIPS Certification

The DUHK Attack leverages a 20-year-old random number generator flaw to recover private keys. More pertinent, researchers said, is that the flaw exposes gaps in the FIPS certification process. Continue reading DUHK Attack Exposes Gaps in FIPS Certification

Practical Public Key Cryptography

Encryption is one of the pillars of modern-day communications. You have devices that use encryption all the time, even if you are not aware of it. There are so many applications and systems using it that it’s hard to begin enumerating them. Ranging from satellite television to your mobile phone, from smart power meters to your car keys, from your wireless router to your browser, and from your Visa to your Bitcoins — the list is endless.

One of the great breakthroughs in the history of encryption was the invention of public key cryptography or asymmetrical cryptography in the 70’s. …read more

Continue reading Practical Public Key Cryptography