Cryptography and Information Security

If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees.

— Kahlil Gibran

One of the biggest news/scandals nowadays involving tech companies are usually related to data breaches. A data breach is referred as an event in which someone steal or get access to information without the consent of the owner of such information.

In the technology sector, we use Cryptography to keep secrets, together with other techniques and services deployed in our electronic devices.

In this blog, you can find the foundations of current cryptography practices as well as techniques and software related to Network Security.

Say YES to security

If you are new to cryptography, I recommend you to start here:

You can also browse to several categories using the menu, or you can find them below.

Information Security ↗

Find out the similarities between a computer security system and a physical protection system to facilitate its understanding.

Symmetric ↗

Symmetric cryptography is about algorithms that use the same keyword to encrypt and decrypt information.

Asymmetric ↗

Asymmetric algorithms are very important in cryptography and especially in digital signatures.

Keys ↗

In cryptography, we secure a message by encrypting the message with a certain key and then sending it over the network. 

Digital Certificates ↗

We can use a Digital Certificate to share a public key. That public key can then be used to start a secure … 

Digital Signature ↗

A digital signature is a mechanism we can use to verify the authenticity of a message/document. 

Hash Functions ↗

A cryptographic hash function is an algorithm that has two main properties: it is a one-way function and is collision-free.

Network Security ↗

Network Security is about protecting your network from data breaches, intrusions, etc. Find out more about tools and techniques …

Notice that some articles falls into more than one category.

“A cryptographic system should be secure even if everything about the system, except the key, is public knowledge.”

— Auguste Kerckhoffs

Latest posts

  • The 7 tenets of zero trust (NIST SP 800-207)
    The 7 tenets of zero trust provided in NIST SP 800-207, are an attempt to define what should be included in a zero trust architecture […]
  • What is an NFT
    Contributed by Ismael Stephanus. NFTs are digital assets that live on a blockchain. They are non-interchangeable with other items because they have unique properties and […]
  • What is a next generation firewall (NGFW)?
    A next generation firewall is a must-have in nowadays cybersecurity environments. NGFWs improve traditional firewalls in many ways, to improve network security. According to Gardner, […]
  • What is Zero Trust Architecture?
    Zero trust architecture (ZTA) provides us with tools and principles to increase security in enterprise networks. This effort becomes especially relevant nowadays with the increase […]
  • Architecting secure Cross-Chain infrastructure with CCIP
    Contributed by Mulanduleni Niilungu. Combining different blockchain networks is of great interest because it can be used to give new and enhanced services by communicating […]
  • How Cryptography is applied to Off-Chain Assets
    Contributed by Michael Shuufeni. In this article, you will learn what are off-chain assets and how cryptography is applied to them. What are Off-Chain Assets? […]