Digital certificate basics

Digital certificate is an electronic credential that is required by public key infrastructure (PKI) systems that can securely identify an individual as well as create an association between the individuals authenticated identity and public key.  Certificate authority (CA) is a…

Implementing encryption protocols

WEP, which stands for wireless encryption protocol, provides encrypted communication between wireless clients and access points.  WEP uses key encryption algorithm to encrypt messages between devices.  Each client and access point on the wireless LAN must use the same encryption key.  The…

Types of asymmetric encryption algorithms

On my last post, I’ve talked about the types of symmetric encryption algorithms.  Today, I’ll be covering different types of asymmetric encryption algorithms. RSA is one of the most popular asymmetric public key algorithms because it was technically the first…

Types of symmetric encryption algorithms

Let’s talk about the types of symmetric encryption algorithms.  You can read about how symmetric encryption works by clicking here.  The types of symmetric encryption algorithms I want to cover today are DES, 3DES, AES, Blowfish, twofish, IDEA, and RC4.  Basically…

Types of message digest hashing

I talked about message digests in minor detail on my previous post.  Message digest hashing algorithms can be used for digital signature when a massive message must be hashed in a secure manner.  A digital signature is something that’s created when the digest of…