What is a Salt Value and how does it help to protect the stored passwords of your application’s users from attacks involving Rainbow Tables? Read on to find out now.
Hash functions calculate a fixed length binary digest of a document. Read on to see what additional requirements turn an ordinary hash function into a cryptographic hash function and what use cases require the use of cryptographic hash functions.
Certificates are containers for asymmetric encryption keys that can be used to establish a chain of trust between communicating parties. Read on to see how this works in practice.
Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt. Read on to see the advantages and disadvantages of this type of encryption.
A symmetric key encryption algorithm is a cryptographic algorithm the uses the same secret key for the encryption and the decryption step. Common examples include DES, RC4 and AES of which only AES can be recommended for use.