Cryptoucan™

In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Teaching Cryptography: Rubik’s Cube Diffusion

Although we are dealing mostly with asymmetric encryption here at Trustica, truth is that in the end you need to encrypt stuff using some symmetric algorithm. Just exchanging the symmetric keys is not enough – the symmetric cipher must be built from strong cryptographic primitives creating both confusion and diffusion. Read on to find out what one of my Cryptography class students proposed.

■ ■ ■