Chapter 7: The Role of Cryptography in Information Security
After its human resources, information is an organization's most important asset. As we have seen in previous chapters, security and risk management is
Quantum Cryptography Outperformed By Classical Technique | Amazing Science
Quantum cryptography has had a bad couple of years. For a decade or so, we were promised the capability to send messages with absolute secrecy guaranteed by the laws of physics. At least in theory. In practice, however, things turned out a little differently. In 2010, a team at the University of Toronto in Canada announced that they had successfully hacked a commercial quantum cryptography system. The problem was not the theory but the practical limitations of the equipment used to carry…
Random Challenge / Response Authentication in Plain English
By: Gunter Fuchs Working deep down in the guts (bits and bytes) of a computer, it becomes hard to explain concepts, once the electronic world has taken them over. I wondered about a simple way to e…
Shop hardware authentication security keys
Yubico.com is the source for top-rated secure element two factor authentication security keys and HSMs. Buy YubiKey 5, Security Key with FIDO2 & U2F, and YubiHSM 2. Made in the USA and Sweden.