-
Rivest–Shamir–Adleman (RSA) example
This post presents a working example of RSA’s key generation, encryption, and signing capabilities. The post covers the steps involved in generating an RSA key, and then applies the key to a plain text to see how RSA encryption works. This post constitutes Part 6 of a series of posts exploring how SSL and TLS…
-
Replay attacks and anti-replay methods
This post discusses replay attacks and anti-replay methods. Six anti-replay methods that are not mutually exclusive are covered, including using sequence numbers, using cryptographic hashes, and rotating the secret keys. This post constitutes Part 5 of a series of posts exploring how SSL and TLS use cryptographic tools to secure data transmitted over the Internet…
-
Authentication methods
This post discusses cryptographic authentication methods. We look at three common methods of authentication: username and password, Pre-Shared Keys (PSKs), and digital certificates. This post constitutes Part 4 of a series of posts exploring how SSL and TLS use cryptographic tools to secure data transmitted over the Internet or a computer network. You may also…
-
Using asymmetric keys
This post discusses how asymmetric keys are used to perform two separate cryptographic operations, message confidentiality and message signing. We look at two real world applications involving the asymmetric key pair, real world encryption and real world signatures. This post constitutes Part 3 of a series of posts exploring how SSL and TLS use cryptographic tools…
-
Confidentiality and cryptographic encryption
This post discusses confidentiality and cryptographic encryption. This post sheds light on how cryptographic encryption can be used to achieve data confidentiality. This post constitutes Part 2 of a series of posts exploring how SSL and TLS use cryptographic tools to secure data transmitted over the Internet or a computer network. You may also be…
-
Hashing algorithms and message integrity
This post explains hashing algorithms and message integrity. This post kicks off a series of posts focusing on key concepts in cryptography. This post constitutes Part 1 of a series of posts exploring how SSL and TLS use cryptographic tools to secure data transmitted over the Internet or a computer network. You may also be…
-
Cloud computing framework (NIST SP 800-145)
This post sheds light on the topic of cloud computing by elaborating a cloud computing framework based on NIST SP 800-145 – The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology. First, traditional cloud computing models are introduced. Then NIST’s definition of cloud computing is presented. A discussion of…
-
What is the Google Cybersecurity Professional Certificate?
The Google Cybersecurity Professional Certificate is “your path to a career in cybersecurity”. This certificate program will teach you “in-demand skills that can have you job-ready in less than 6 months. No degree or experience required”. You may also be interested in What is the Google Data Analytics certification? Google Cybersecurity Professional Certificate – highlights Google Cybersecurity Professional…
-
What is the Google Data Analytics certification?
Looking to know what is the Google Data Analytics certification all about? The Google Data Analytics Professional Certificate Program can take you from zero to entry-level data analyst superhero in about six months of studying at a pace of about 10 hours per week. The course costs US$39 per month by subscription on Coursera. There are no…
-
A framework for understanding NLP
This post offers a framework to understand NLP (Natural Language Processing) technology in terms of techniques and applications. GPT-3 is used as an example of NLP technology to show how the framework can be used. GPT-3 is a large language model (LLM) with 175 billion parameters. We begin with a brief history of NLP. You…