+1-888-690-2424
  • In the Beginning—The Information Revolution

    Part 1 of 1 in the Series — The Evolution of Public Key Infrastructure
    As part of our ongoing celebration of the 20th Anniversary of Entrust’s Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology. In the Beginning: The Information Revolution Since the very earliest days of the information age, secure data networks – including those carrying highly-sensitive military and

        in PKI, Public Key Infrastructure
    0
  • NIST Reconsiders Support for Suspect Algorithm

    The reputation of the U.S. National Institute of Standards and Technology (NIST) took a massive hit last year when it was suggested in revelations made by Edward Snowden that one of its standard procedures for generating random bit sequences had been subverted by the Nation Security Agency (NSA). If the suggestions were correct, then the flaw in the Dual-EC DRBG

        in Encryption
    0
  • Elliptic-Curve Cryptography, Simplified

    Part 2 of 2 in the Series — Zero to 30
    As both standalone and networked computing capabilities continue to grow in-line with Moore’s law, key sizes for the most widely used public-key cryptographic systems have to grow disproportionately fast. This trend makes a switch to elliptic-curve cryptography (ECC) more and more attractive. Unfortunately, ECC has a reputation for being difficult to understand. And this reputation, deserved or not, deters many

        in General
    0
  • Dual-EC DRBG Concerns Hit Media Again

    NIST’s withdrawn special publication 800-90A is back in the news. This time, it’s due to an allegation carried by Reuters that RSA Data Security was paid by the NSA to make the dual-EC (elliptic curve) variant the default deterministic random-bit generator algorithm, or DRBG, in its commercial toolkit product. RSA has denied the allegation. Random-bit generation is a critical foundation of

        in General
    0
  • Elliptic-Curve Cryptography, Simplified

    Part 2 of 2 in the Series — Zero to 30
    As both standalone and networked computing capabilities continue to grow in-line with Moore’s law, key sizes for the most widely used public-key cryptographic systems have to grow disproportionately fast. This trend makes a switch to elliptic-curve cryptography (ECC) more and more attractive. Unfortunately, ECC has a reputation for being difficult to understand. And this reputation, deserved or not, deters many

        in General
    0
  • Dual-EC DRBG Concerns Hit Media Again

    NIST’s withdrawn special publication 800-90A is back in the news. This time, it’s due to an allegation carried by Reuters that RSA Data Security was paid by the NSA to make the dual-EC (elliptic curve) variant the default deterministic random-bit generator algorithm, or DRBG, in its commercial toolkit product. RSA has denied the allegation. Random-bit generation is a critical foundation of

        in General
    0
Page 1 of 212