🔐 Another #PentestChronicle, another problem with cryptography 🔐 We've just completed a revealing pentest that clearly illustrates the risks of custom cryptography! Check out Mateusz Lewczak's article, "Why you shouldn't (again) roll your own cryptography - real-life pentest showcase from 2024," where we dive into a recent case where custom crypto led to some serious security problems. 🚀 What's Inside: 👉 We’re always on the hunt for those tricky, complex vulnerabilities. 👉 Our latest findings show how even well-meaning crypto can open doors for attackers if not done right. 👉 We start with some theory and then based on this we disscuss THREE different attack vectors on tested cryptography algorithm. It’s a real talk on the importance of sticking to the security standards and why getting creative with cryptography could backfire. 📖 Dive into the full story here: https://lnkd.in/degnnd5g #Cybersecurity #PentestChronicles #Cryptography #InfoSec
Securitum’s Post
More Relevant Posts
-
Building an inventory of your use of cryptography helps you: 📌 Pinpoint keys, certificates, cryptographic libraries, and algorithms 📊 Assess threat criticality 🗂️ Manage cryptographic assets ✅ Shore up vulnerabilities and ensure compliance Get in touch with us to start your 30-day trial with AgileSec™ Analytics. 🇫🇷 En français : https://lnkd.in/dXvsSrQX 🇩🇪 Auf Deutsch: https://lnkd.in/deYxpq2Y #cryptography #PQC #quantum #cryptoagility #dataprotection #cybersecurity
To view or add a comment, sign in
-
In an era where data is king, safeguarding our online world is paramount. Enter cryptography, the art of protecting information through encryption and decryption. 💻🔑 Join me in exploring the fascinating world of cryptography, where complex algorithms lock away sensitive data, ensuring privacy and integrity. From secure communication to financial transactions, cryptography shields us from cyber threats, making the digital landscape safer for all. 🌐🛡️ Let's unveil the magic behind cryptography, unravel its secrets, and appreciate its significance in today's tech-driven world. Together, we can build a more secure and trustworthy digital future! 🚀💡 #cryptography #cybersecurity #encryption #dataprotection #digitaltrust
To view or add a comment, sign in
-
-
Verto'23 | Top 6% @TryHackMe | CyberSec-Web3 Undergrad @LPU | SoC-1 Ardent | Ethereum Neophyte | German A1 🇩🇪 | Mindfulness Practitioner | Learner @ThinkSchool | Committed contributing to a secure digital world 🥷🏻
Just another one too during this break from operations 🤭🚀 This time it was "Encryption — Crypto 101" 😈 It covered a lot including why cryptography matters for security and CTFs, the two main classes of cryptography and their uses, RSA and some of its applications, two methods of key exchange, and notes about the future of encryption with the rise of quantum computing. Whoo, read a lot, understood a lot, watched a lot of videos from University of Nottingham 🪴🐧 With cybercrime increasing, it's crucial for us stay informed and vigilant. Make sure you're also following CyberDost for the latest tips and updates on staying safe online! ✅🍀 Check out my write up also, it takes time to knit all these: https://lnkd.in/eGS53s4s #cybersecurity #encryption #cryptography #TryHackMe #infosec #cybercrime #CyberDost #techlearning #CTFs #QuantumComputing
To view or add a comment, sign in
-
2024 Update - Are You Post-Quantum Ready? Quantum Countdown Starts Now! Back in September 2023, we wrote about NIST shortlisting 3 quantum-computing resistant algorithms. With the imminent finalization of Post-Quantum Cryptography (PQC) standards this year, 2024 is when it becomes real. Begin your journey to a Quantum-Secure future by first conducting a Crypto Health Check: to discover, map, assess your current encryption inventory vulnerabilities, followed by planning for the transition. Don't know where to start. Please feel free to PM us or leave a comment below. We are here to help. #postquantum #cryptography #cybersecurity #nist #ABPGroup #Sunnic
To view or add a comment, sign in
-
-
🔐 Exploring the World of Cryptography 🌐 Dive into the intriguing world of cryptography with "Selected Topics in Cryptography." If you're passionate about securing information, protecting privacy, and unlocking the secrets of encryption, this is a must-read! 📚 Resource Link: Selected Topics in Cryptography [https://lnkd.in/gtw2YCmJ] Cryptography touches every aspect of our digital lives, from secure online transactions to safeguarding sensitive data. It's a powerful tool in the hands of experts. So, whether you're a beginner or a seasoned pro, there's always something new to discover. Join the journey to unravel the mysteries of encryption and keep your digital world safe and sound. 🤓💻🔒 #Cryptography #Cybersecurity #DataPrivacy #Encryption #InfoSec #CyberneticoBD #CBD
To view or add a comment, sign in
-
-
Mathematics Instructor @ Ministry of Labour and Human Resource Department | MPhil (Mathematics) | M.A (Education) |
Cryptography is the silent guardian of our online interactions, ensuring that sensitive information remains secure and private. It's the art and science of transforming information into code, making it challenging for unauthorized parties to access or decipher. In cybersecurity, cryptography plays a crucial role in safeguarding data during transmission or storage. From classical methods like Caesar ciphers to complex algorithms like RSA and AES, cryptography involves various techniques to create a digital lock and key system. Its beauty lies in its ability to keep our online interactions confidential and secure. #cybersecurity #cryptography #onlinesecurity
To view or add a comment, sign in
-
-
Explore Cryptography to learn the basics and types! From historical ciphers to advanced algorithms, understand objectives like confidentiality and authenticity. Unveil the simplicity of Secret Key Cryptography and the balance in Public Key Cryptography. https://lnkd.in/gm8zJipa #EncryptionConsulting #Cryptography #Encryption #Decryption #PKI #HashFunctions #DataProtection #Cybersecurity
To view or add a comment, sign in
-
-
Associate Subsea Engineer | Associate Project Manager | Engineering Piping Design | ASNT NDT Inspector
As a learner of Cryptography, I've come to understand the importance of data protection. Encryption, one of the key components of Cryptography, plays a crucial role in safeguarding data from unauthorized access during transmission. Hashing, on the other hand, ensures that data has not been tampered with. Knowledge of these concepts is a must-have in today's digital landscape. #Cybersecurity #Cryptography #Encryption #Hashing #DataProtection
To view or add a comment, sign in
-
-
Cybersecurity Analyst |Securing Vital Systems | Cybergirls 4.0 | IT/OT |(ISC)2 CC | Offensive security
Day 45 of 100. Encryption-Crypto 101. Cryptography was one of my favorite units. Today I used TryHackMe to study for this particular topic. 🧠 Cryptography is used to protect confidentiality, ensure integrity, and ensure authenticity. 🧠 When connecting to your bank, there’s a certificate that uses cryptography to prove that it is your bank rather than a hacker. 🧠 The two main categories of Encryption are symmetric and asymmetric. 🧠 Symmetric encryption uses the same key to encrypt and decrypt the data. Examples are; DES (Broken) and AES. 🧠 These algorithms tend to be faster than asymmetric cryptography and use smaller keys (128 or 256-bit keys are common for AES, and DES keys are 56 bits long). 🧠 Asymmetric encryption uses a pair of keys, one to encrypt and the other in the pair to decrypt. Examples are; RSA and Elliptic Curve Cryptography. 🧠 Usually referred to as a public key and a private key. Data encrypted with the private key can be decrypted with the public key, and vice versa. 🧠 Asymmetric encryption tends to be slower and uses larger keys, for example, RSA typically uses 2048 to 4096-bit keys. #cybertechdave100daysofcyberchallenge #cybersecurity #cryptography #encryption
To view or add a comment, sign in
-
Create📝Publish🗞️Amplify📣 TechInfluencer, Analyst, Content Creator w/550K Social Media followers, Deep Expertise in Enterprise 💻 Cloud ☁️5G 📡AI 🤖Telecom ☎️ CX 🔑 Cyber 🏥 DigitalHealth. TwitterX @evankirstel
Cryptography is the foundation of digital trust. Isara is clearing the path to #quantum-safe security by developing crypto agility solutions to enable organizations to discover, manage & remediate encryption #cybersecurity #infosec Atsushi Yamada
Cryptography is the foundation of digital trust.
www.linkedin.com
To view or add a comment, sign in