Categories
IT Security Outsourced IT

Zero-Knowledge Password Protocol

What is Zero-Knowledge Password Protocol? Zero-knowledge password protocol or zero-knowledge proof (ZKP) is a method in cryptography where one party (the prover) can prove to the other party (the verifier) that he knows the secret information without revealing it. With ZKP, there is no transmission or storage of password/credential details on the authentication server. The […]

Categories
IT Security Outsourced IT

Randomness and Entropy

What are Randomness and Entropy? Most modern encryption relies on randomly generated keys. Random numbers are used in many places within the realm of information technology, and they are also used in other fields, such as in the sciences. In mathematical statistics, randomness has been defined as, “of or relating to a type of circumstance […]

Categories
IT Security Outsourced IT

Elliptic Curve Cryptography

What is Elliptic Curve Cryptography? Elliptic Curve Cryptography (ECC) is a public-key algorithm based on the elliptic curve defined over a finite field. ECC works by creating a public key and a private key on an elliptic curve. The public key is shared with others, while the private key is kept secret. Encryption and decryption […]

Categories
IT Security

Cryptography

What is Cryptography? Cryptography is the study of secure communication techniques that allow only the sender and intended recipient of a message to view it. The term is derived from the Greek word kryptos, which means hidden. Cryptography uses mathematical techniques to transform data and prevent it from being read or manipulated by unauthorized parties. […]