Public key cryptography and security certificates

Public Key Cryptography offers ultimate security being based asymmetric keys and is the backbone for popular protocols like SSL (Security Socket Later) to be able to communicate securely between web-servers and browsers. However whole ecosystem is based on passing or exchanging security certificates. Article explains public key cryptography and the role of security certificates and the way they are used by the secure protocols to provide ultimate security.

.entry-summary

Securing your apps with Public Key Cryptography & Digital Signature

Public Key Cryptography offers ultimate security being based asymmetric keys; however it does have a specific purpose and is often not a replacement of symmetric crypto algorithms like AES. This article provides the security behind Public Key Cryptography with practical details on how this is used by some of the popular tools like PGP, SSL as well as Digital signature.

.entry-summary

Understanding the security framework behind RSA SecurID

RSA SecurID® is a pretty popular mechanism for performing secure remote access for a user to a network resource. However this gets often confused with RSA public key algorithm that is based on Asymmetric or Public key cryptography. RSA SecurID is based on two-factor Authentication that makes it different than publically known RSA algorithm. The Article presents the underlying security architecture behind RSA Secure ID and potentially vulnerabilities.

.entry-summary

Advanced Metering : Security Threats, Challenges and Counter Measures

Energy theft and meter tampering are world-wide problems that contribute heavily to revenue losses. Consumers have been found manipulating their electric meters, causing them to stop, under-register or even bypass the meter, effectively using power without paying for it. Apart from preventing physical tampers requiring smart solutions on chip, smart grid technologies are now in the process of being deployed. These solutions require a combination of different technologies and rely on network connectivity, posing significant security issues that must be addressed from the beginning. This paper covers vulnerabilities, challenges and techniques to prevent tampering in an energy meter, improving overall security (hardware and software) in a smart grid.

.entry-summary