Tag: cryptography

Montgomery Curves in Projective Coordinates

Written by Dominik Joe Pantůček on 2020-02-06

If you ever wondered, how does the cryptography Cryptoucan™ actually employ look like and how do the elliptic curves used actually look, now it is time you wonder no more. Read on to see what does the curve used for encryption look like!

...

Teaching Cryptography: Rubik's Cube Diffusion

Written by Dominik Joe Pantůček on 2019-05-16

Although we are dealing mostly with asymmetric encryption here at Trustica, truth is that in the end you need to encrypt stuff using some symmetric algorithm. Just exchanging the symmetric keys is not enough - the symmetric cipher must be built from strong cryptographic primitives creating both confusion and diffusion. Read on to find out what one of my Cryptography class students proposed.

...

Symmetric cipher modes

Written by Dominik Joe Pantůček on 2019-03-07

Designing a perfect storage for your private keys is one thing. But generally speaking - using cryptography properly is much bigger challenge for the users and all the software in security ecosystem. Read on to find some interesting aspects of symmetric ciphers you might not have known about.

...

BLAKE2 embedded implementation

Written by Dominik Joe Pantůček on 2018-12-27

Developing a cryptographic device requires going through all different parts of the system to deliver something the user can really trust. Read on to see why you should care what cryptographic primitives and how your devices use internally.

...

Securing email

Written by Dominik Joe Pantůček on 2018-08-30

After creating a robust solution for mail sending, filtering, delivering and storing, one starts wondering how to add more confidentiality and integrity to such communication setup security mix. DKIM signatures and SPF records are mostly helpful for fighting spam, but for an targeted attack they pose little to no threat. And as targeted attacks are always really big threat, this does not make the situation look very optimistic for the email user. Nowadays, there are at least two major standards used for securing email communication. Both have their advantages and both have their disadvantages - so let's have a closer look at both of them. And as you can probably guess, we are getting closer to our goal of securing email communication using at least one of these standards.

...