When do we need cryptographic keys authenticity? What can we do to provide keys authenticity?

Cryptographic keys authenticity is a problem that I think only a few people encounter.
Based on what I understand, the most common way to solve this specific problem was to bind one’s private identity such as email/phone number/IP addresse… Continue reading When do we need cryptographic keys authenticity? What can we do to provide keys authenticity?

How vulnerable is security if a public key is swapped by active attacker if a key check is done?

Trying to understand this from a high level conceptually. It is obvious from all information on Asymmetric encryption that a public key can be of course, public and there isn’t a danger of interception. So I’m faced with a point in my soft… Continue reading How vulnerable is security if a public key is swapped by active attacker if a key check is done?

How does the inclusion of a subprime q value affect the Diffie Hellman equation for key exchange? [duplicate]

This is a follow on from this question:
"Diffie-Hellman Key Exchange" in plain English
In the answer to that question, the standard Diffie Hellman key exchange equation is derived:
(g^a mod p)^b mod p = g^ab mod p
(g^b mod p)^a m… Continue reading How does the inclusion of a subprime q value affect the Diffie Hellman equation for key exchange? [duplicate]

Not understanding why I should use public/private key encryption over password?

My knowledge about these topics is very elementary, please "school me" if I said something completely wrong, it would surely help me understand these things better. Now, to my issue.
Now that I have a laptop and didn’t encrypt th… Continue reading Not understanding why I should use public/private key encryption over password?