Blog

Teaching Cryptography: Rubik's Cube Diffusion

Written by Dominik Joe Pantůček on 2019-05-16

Although we are dealing mostly with asymmetric encryption here at Trustica, truth is that in the end you need to encrypt stuff using some symmetric algorithm. Just exchanging the symmetric keys is not enough - the symmetric cipher must be built from strong cryptographic primitives creating both confusion and diffusion. Read on to find out what one of my Cryptography class students proposed.

...
...
...

Cryptoucan™ usage: Personalization on Windows

Written by Lída Hrnčířová on 2019-04-25

In this blog post we will show you which personal information stored on Cryptoucan™ you can modify and what software to use. This is accompanied by instructional video for Windows that will guide you through the whole personalization process.

...

Side channel attacks: Display

Written by Jiří Keresteš on 2019-04-18

In today's post, we will focus on one of Cryptoucan's many lines of defense: display power analysis attack prevention.

...