 
      
    | You are here | neilmadden.blog | ||
| | | | | thatsmaths.com | |
| | | | | A digital signature is a mathematical means of verifying that an e-document is authentic, that it has come from the claimed sender and that it has not been tampered with or corrupted during transit. Digital signatures are a standard component of cryptographic systems. They use asymetric cryptography that is based on key pairs, consisting of... | |
| | | | | keymaterial.net | |
| | | | | One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don't have. Whether that's invisible salamanders or binding through shared secrets, anything that isn't just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. Normally, with a signature scheme, you have the public key... | |
| | | | | blog.cryptographyengineering.com | |
| | | | | This page has some wonky notes about the Secure Remote Password protocol. TL;DR: I don't like it. It's also not obviously broken. But it's inefficient and you should use OPAQUE. Like most PAKE protocols, SRP has two phases. In the sign-up phase, the user registers a "password verifier" with the server. This valueis not actually... | |
| | | | | www.sonatype.com | |
| | | Sonatype CTO Brian Fox and Forrester Senior Analyst Janet Worthington discuss securing your organization's software supply chain. | ||