• Category Archives encryption
  • Computer Forensics

        Computer forensics has helped solve a number of criminal cases although a disproportional number of these cases have been for child porn, there are a few which were not. Of those non-child porn cases, one stands out, murder most foul. One murderer that would drive police and the FBI crazy for years until that fateful day that he made one mistake.
    Continue reading  Post ID 172

    Share

  • Web Site Cryptography

        Every time you connect to a website on the internet and need to send something securely you look for the little padlock in your browser to show that you have connected to a secure website. To do this we use a system called Hypertext Transfer Protocol over Secure Socket Layer (HTTPS). However, there are a number of crypto technologies that secure the connection between you and the website that you are connecting to. Below we will look at four websites and the crypto algorithms that they use in securing your connection to them.
    Continue reading  Post ID 172

    Share

  • Cryptographic Algorithms

        Throughout time man has had secrets that needed to be sheared without others knowing what was talked about. This led to the development of cryptography to help man meet this requirement. Cryptography is the practice of the enciphering and deciphering of messages in secret code in order to render them unintelligible to all but the intended receiver (Merriam-Webster, 2014). However, in the modern day cryptography has taken on new importance as we have the need to pass more and more data securely. Below we will look at the strengths, weaknesses of symmetric, asymmetric, and hybrid cryptography along with the systems and algorithms they use.
    Continue reading  Post ID 172

    Share

  • Internet Based Conferencing Security

        Over the years, it has always been necessary for people to have meetings. These meetings generally happen face to face, and as businesses became more globalized, it became necessary for management to travel to have these meetings. This travel although necessary was a great expense for an organization. A five-person meeting conducted in-person (involving plane travel for four of the attendees) is over seven times more expensive than a meeting conducted by audio conference, and nearly three times as expensive as a videoconference (INFOCOM, 2014). Leading to cost saving measures, which initially toke the form of conference calls over the analog phone systems.

    Continue reading  Post ID 172

    Share

  • Trusted Third Party in Enhancing Electronic Commerce

                What is a trusted third party and how does it enhance electronic commerce?  In cryptography, a trusted third party (TTP) is an entity that facilitates interactions between two parties who both trust the third party (Wikipedia, 2013).  This is similar to a notary public who acts as a trusted third party when it comes to duplicating legal documents.  Both Verisign and TRUSTe act as trusted third parties by building trust relationships between customers and venders like Amazon and Newegg.  So how do Verisign and TRUSTe build the trust environment? Continue reading  Post ID 172

    Share

  • PGP Just a Good Idea…

                Here we are in 2013 a world away from the days that one could trust that communications would not be intercepted and read by third parties.  However, with recent disclosures about government spy programs, elite hacker groups, and just normal people sneaking a look see at your computer, what can one do to protect their private communications and data?  Never fear there are ways of protecting your data in the guise of personal encryption systems; so let us look at one. Continue reading  Post ID 172

    Share