Information Security SSL/TLS

SSL/TLS

The SSL (Secure Sockets Layer) or know as TLS (Transport Layer Security) is a building block and not just a standalone application. It is the foundation for secure communication in a lot of networked applications. Netscape Communications developed the SSL originally. In 1995, version 2.0 was released and the first version made available publicly. In …

Read Article Read More

Information Security Asymmetric-key Cryptography (Public Key Encryption)

Asymmetric-key Cryptography (Public Key Encryption)

Asymmetric key encryption is a cryptographic system that uses pairs of keys. Public keys can be distributed widely. Private keys can only be known to the owner. This achieves encryption and authentication, where the public key verifies a holder of the paired private key. Any user can encrypt a message by using the receiver’s public …

Read Article Read More

Information Security Symmetric-Key Cryptography (Private Key Encryption)

Symmetric-Key Cryptography (Private Key Encryption)

Symmetric key encryption is the oldest and best-known technique. It can be utilized to secure communication between two or more parties with a shared same secret key. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the …

Read Article Read More

Information Security Cryptography

Cryptography

It is the study and practice of secure communication against the third party attackers. Cryptography is used to inventing and analyzing protocols that stopped third parties from accessing the transmitted messages. It is fulfilling the below functions. Confidentiality – The information in the message can access only to people who are authorized to access it. …

Read Article Read More