January 15, 2014
RSA says it adopted the Dual EC algorithm in 2004, meaning an alleged 2006 NSA payoff makes no sense. But there are plausible explanations.
December 24, 2013
Software architecture risk analysis doesn't have to be hard. Gary McGraw and Jim DelGrosso discuss an easier, more scalable process.
Cryptography Get Started
Bring yourself up to speed with our introductory content
Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. The term is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Continue Reading
A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users. The assignment of DRA rights to an approved individual provides an IT department with a way to unlock encrypted data in case of an emergency. Continue Reading
This CISSP practice test, which is a part of the SearchSecurityChannel.com CISSP Study Guide, will test your knowledge of cryptography and help you pass the CISSP exam. Continue Reading
Evaluate Cryptography Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Dave Shackleford distills advice from the CSA on the most pressing big data security challenges for enterprises in cloud environments. Continue Reading
Using power analysis attacks, including Simple Power Analysis, hackers can attack the embedded microchips inside smart cards. Continue Reading
Learn to apply best practices and optimize your operations.
Learn what separates Logical Domains from other hypervisors and use this excerpt to find out all the relevant information for VARs on domain implementation and configuration. Continue Reading
In this Ask the Expert Q&A, Michael Cobb, our application security expert explains how RSA and DH/DSS differ, examines the strengths and weaknesses of each, and, explains how to use the compression library Zlib. Continue Reading
Problem Solve Cryptography Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Learn how to analyze the Zeus config.bin file in order to identify targeted URLs and infected computers on your network. Continue Reading
Cryptography on the mainframe protects sensitive data and aids organizations' compliance to security regulations such as the Payment Card Industry Data Security Standard. This tip discusses the hardware and software available for cryptography on the mainframe, how it works, and concerns mainframe programmers should keep in mind. Continue Reading
In this SearchSecurity.com Q&A, identity management and access control expert, Joel Dubin, discuses several ways to verify that Federal Information Processing Standard 140-2 is being enforced. Continue Reading