2 min read
SHA-1 is Practical and Cost-Effective to Crack Now
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.
2 min read
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.
4 min read
In today’s cyber-world there is an ever-present risk of unauthorized access to all forms of data. Most at risk is financial and payment system data...
5 min read
“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very...
4 min read
The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...
3 min read
Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...
3 min read
According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...
3 min read
Cryptographic keys are used to secure data-at-rest and data-in-transit. Trying to keep them protected yet always available for use is one of the most...