Introduction to cryptographic knowledge – Cryptography

After getting acquainted with the basic concepts of information security, we want to enter the topic of cryptography and get acquainted with different methods of cryptography. Cryptography, In the previous article of the Proceedings of…

Fundamentals of Information Security – OTP Encryption and cryptography

In the previous article, we started with cryptography. After getting acquainted with the basic definitions of cryptography, now in this article we are going to describe the One Time Pad cryptography method. Cryptography, This is one…

How SSL Public Key Cryptography Works for Internet Security

AN INTRODUCTION TO KEY CRYPTOGRAPHY This document explains how Netscape uses RSA public key cryptography for Internet security. Netscape’s implementation of the Secure Sockets Layer (SSL) protocol employs the techniques discussed in this document. RSA…

UK Cryptography and Information Security Policy Issues

I take a keen interest in UK government policies on cryptography and information security.  I am often asked where I stand on a number of issues and this page summarises my position on some of…

Debian / Ubuntu: Install Duplicity For Encrypted Backup In Cloud

My cloud based backup service provider has ssh access to the backup system. How do I install and configure duplicity software for remote backups in incremental and encrypted format on Debian or Ubuntu Linux based…

GPG Change Passphrase Secret Key Password Command

I know how to cange a passphrase for openssh using ssh-keygen command. How do I change a GPG encryption key’s passphrase on Linux or Unix like operating systems? How do I change the passphrase of…

HowTo: Create a Self-Signed SSL Certificate on Nginx For CentOS / RHEL

I operate a small web site on Cloud server powered by CentOS Linux v6.4. I would like to encrypt my site’s information and create a more secure connection. How do I create a self-signed SSL…

How To Setup SSH Keys on a Linux / Unix System

I recently read that SSH keys provide a secure way of logging into a Linux and Unix-based server. How do I set up SSH keys on a Linux or Unix based systems? In SSH for…

How To Patch and Protect OpenSSL Vulnerability # CVE-2015-0291 CVE-2015-0204 [ 19/March/2015 ]

O n 19th March 2015, multiple high and moderate severity level vulnerabilities released in OpenSSL, a Secure Sockets Layer toolkit used in a Linux and Unix-like systems. How can I fix these vulnerabilities on a…

How To Patch and Protect OpenSSL Vulnerability # CVE-2015-0291 CVE-2015-0204 [ 19/March/2015 ]

O n 19th March 2015, multiple high and moderate severity level vulnerabilities released in OpenSSL, a Secure Sockets Layer toolkit used in a Linux and Unix-like systems. How can I fix these vulnerabilities on a…