Cryptography and Information Security

If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees.

— Kahlil Gibran

One of the biggest news/scandals nowadays involving tech companies are usually related to data breaches. A data breach is referred as an event in which someone steal or get access to information without the consent of the owner of such information.

In the technology sector, we use Cryptography to keep secrets, together with other techniques and services deployed in our electronic devices.

In this blog, you can find the foundations of current cryptography practices as well as techniques and software related to Network Security.

Say YES to security

If you are new to cryptography, I recommend you to start here:

You can also browse to several categories using the menu, or you can find them below.

Information Security ↗

Find out the similarities between a computer security system and a physical protection system to facilitate its understanding.

Symmetric ↗

Symmetric cryptography is about algorithms that use the same keyword to encrypt and decrypt information.

Asymmetric ↗

Asymmetric algorithms are very important in cryptography and especially in digital signatures.

Keys ↗

In cryptography, we secure a message by encrypting the message with a certain key and then sending it over the network. 

Digital Certificates ↗

We can use a Digital Certificate to share a public key. That public key can then be used to start a secure … 

Digital Signature ↗

A digital signature is a mechanism we can use to verify the authenticity of a message/document. 

Hash Functions ↗

A cryptographic hash function is an algorithm that has two main properties: it is a one-way function and is collision-free.

Network Security ↗

Network Security is about protecting your network from data breaches, intrusions, etc. Find out more about tools and techniques …

Notice that some articles falls into more than one category.

“A cryptographic system should be secure even if everything about the system, except the key, is public knowledge.”

— Auguste Kerckhoffs

Latest posts