Tagged: encryption

0

How To Install and Use GPG Encrytion In Linux In Order To Encrypt and Decrypt Files and Folder?

Security is important part of the today’s IT operations. There are a lot of tools which provides some part of the secure operations. GNU Privacy Guard or simply GPG is a one of them. It provides encryption, decryption, digital signatures and signing. Install GPG To Ubuntu, Debian, Mint and Kali...

0

How To Install and Configure Openssl Suite On Windows

OpenSSL is very popular security library and tool. OpenSSL provides a lot of security algorithms, standards, protocols as library and tool. OpenSSL mainly developed in the Free software and Linux community but this doesn’t mean Windows do not use OpenSSL library and tools. In this tutorial we will learn how...

0

What Is TPM? Manufacturing, Management and Maintenance Of TPM

Trusted Platform Module or TPM is an international standard for a secure cryptoprocessor.  This standard is developed by Trusted Computing Group and standardized by International Organizational Standardization (ISO) and International Electrotechnical Commission (IEC)  with number ISO/IEC 11889 in 2009. Versions TCG continues to revise the  TPM specification. Latest version is...

0

PGP How To Verify Files In Linux?

GnuPG is opensource and popular alternative to the PGP. PGP provide encryption related function. PGP provides hash function like standard linux packages. We will look ow to verify files downloaded from internet with their PGP signatures to verify. Find PGP Information In this example we will use Apache source code....

0

How To Generate Self Signed Certificates

Hi, x509 certificates are used widely by a lot of applications. Generating x509 certificates seem to be hard and rocket science, but it is not. We will generate a key named t1.key and then create a signing request from this key. After that to signed our request we will generate...

0

How To Generate Random Numbers In Linux

Generating random numbers can be seem odd. But it is very important for security. In security field whatever best chiper or algorithm you use if you can’t generate random numbers it is useless from point of view of security. So how can we generate random numbers in linux environment. Generate...

Symmetric Cryptography Disadventages 0

Symmetric Cryptography Disadventages

Cryptography was a fiction or a luxury a decade ago and used very less in our daily life. Cryptography history is a log history but modern Cryptography history is very short. Today we are using a lot of services with encryption like google, Facebook, twitter, banking, business applications etc. Cryptography...

How To Create RSA Public and Private Key 0

How To Create RSA Public and Private Key

RSA is an algorithm used for Cryptography. It was patented until 2000 in USA (not whole world) where now it can be used freely. RSA has a lot of usage examples but it is mainly used for encryption of small pieces of data like key and Digital signatures. RSA is...

Enjoy this blog? Please spread the word :)