Cryptography

  • Blog

    How Cybersecurity Analysts Use Cryptography (With Examples)

    The first time I learned about cryptography, at least at its most rudimentary level, was in the 1983 movie A Christmas Story. I won’t opine on how this is likely one of the greatest Christmas movies of all time (Rotten Tomatoes has it at #19, which is practically a crime). Now, as someone in the privacy and security space, I encounter cryptography…

    Read More »
  • Blog

    NIST’s New Post-Quantum Cryptography Standards Announced

    The U.S. National Institute of Standards and Technology this week unveiled three encryption algorithms designed to resist cyberattacks, which industry observers said are a positive step toward preventing cyberattacks that break current encryption methods. The Federal Information Processing Standard (FIPS) 203, 204, and 205 provide standards for general encryption and protecting digital signatures. They were derived from multiple submissions in…

    Read More »
Back to top button
close