AWS Identity and Access Management Roles Anywhere allows you to use temporary Amazon Web Services (AWS) credentials outside of AWS by using X.509 Certificates issued by your certificate auth… Read More
Cryptography, the age-old practice of secure communication, has been an essential aspect of human history. From ancient civilisations using secret codes to modern-day secure digital transact… Read More
AWS Identity and Access Management (IAM) Roles Anywhere enables workloads that run outside of Amazon Web Services (AWS), such as servers, containers, and applications, to use X.509 digital c… Read More
ST often releases new versions of STM32CubeProgrammer, STM32CubeMonitor, STM32CubeMonitor-RF, and STM32CubeMonitor-UCPD. The tools often appear in our columns becaus… Read More
Recently, it occurred to me that there wasn’t a good, focused resource that covers commitments in the context of asymmetric cryptography.
I had covered confused deputy attacks in my… Read More
ST is announcing today new versions of STM32CubeProgrammer, STM32CubeMonitor, STM32CubeMonitor-RF, and STM32CubeMonitor-UCPD. The tools often appear in our columns b… Read More
Amazon Web Services (AWS) recently released PCKS #11 Library version 5.0 for AWS CloudHSM. This blog post describes the changes implemented in the new library. We also cover a simple encrypt… Read More
Gmail uses TLS, or Transport Layer Stability, by default for all e-mail communications, so all of your emails will use the regular encryption as lengthy as the reci… Read More
As you prepare to build or migrate your workload on Amazon Web Services (AWS), designing your encryption scheme can be a challenging—and sometimes confusing—endeavor. This blog p… Read More
Cryptographers and cryptography engineers love to talk about the latest attacks and how to mitigate them. LadderLeak breaks ECDSA with less than 1 bit of nonce leakage? Raccoon attack brings… Read More
Since the IETF’s CFRG decided to recommend OPAQUE as a next-generation Password Authenticated Key Exchange, there has been a lot of buzz in the cryptography community about committing… Read More
Who better to learn about digital signatures from? Art by Kyume
Let’s talk about digital signature algorithms.
Digital signature algorithms are one of the coolest ideas to come o… Read More
In August 2017, we announced the “new” AWS CloudHSM service, which had a lot of improvements over AWS CloudHSM Classic (for clarity in this post I will refer to the services as N… Read More
Today, we are announcing .NET Core 3 Preview 1. It is the first public release of .NET Core 3. We have some exciting new features to share and would love your feedback. You can develop .NET… Read More
Protecting a file using asymmetric cryptography
Problem
I know how asymmetric cryptography works. I know there are two keys (one private and one public).
When someone wants to communicate… Read More