You are here |
www.sjoerdlangkemper.nl | ||
| | | |
littlemaninmyhead.wordpress.com
|
|
| | | | After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of stack overflow posts on security, I have composed a list of the top 10 crypto problems I have seen. Bad crypto is everywhere, unfortunately. The frequency of finding crypto done correctly is | |
| | | |
soatok.blog
|
|
| | | | Ever since the famous "Open Sesame" line from One Thousand and One Nights, humanity was doomed to suffer from the scourge of passwords. Courtesy of SwiftOnSecurity Even in a world where we use hardware tokens with asymmetric cryptography to obviate the need for passwords in modern authentication protocols, we'll still need to include "something you... | |
| | | |
8yd.no
|
|
| | | | Passwords should be set, not sent - and other things I thought about when someone talked about password-emailing as a natural part of the user registration. I'm no security expert, but that's a big n... | |
| | | |
dusty.phillips.codes
|
|
| | The venerable RSA public key encryption algorithm is very elegant. It requires a basic understanding of modular arithmetic, which may sound scary if you havent studied it. It reduces to taking the remainder after integer long division. The RSA Wikipedia article describes five simple steps to generate the keys. Encryption and decryption are a matter of basic exponentiation. Theres no advanced math, and its easy to understand their example of working with small numbers. |