CRYPTOMATHIC BLOG

 

Random bit generation

5 min read

The Weakest Link in Many Cryptosystems - Part 2 of 2

RSA, a short recap In a public key scheme, and for the sake of simplicity, assume a public scheme based on encryption-decryption (as opposed to e.g....

Read More

6 min read

The Weakest Link in Many Cryptosystems – Part 1 of 2

Introduction It is well-known and appreciated by most users - even if often ignored(!) - that if you choose a weak password, you are exposing...

Read More