Securing your apps with Public Key Cryptography & Digital Signature

Public Key Cryptography offers ultimate security being based asymmetric keys; however it does have a specific purpose and is often not a replacement of symmetric crypto algorithms like AES. This article provides some basic information about the security mechanisms behind Public Key Cryptography with practical details on how it is used by some of the popular tools like PGP, SSL …

Understanding the security framework behind RSA SecurID

RSA SecurID is trusted two-factor Authentication protocol often used to authenticate VPN clients enabling users to login to secure servers. Every physical RSA Secure ID device (Figure 1 below) has a unique serial number written on the back of the device. During manufacturing individual SecurID devices are assigned a random 128-bit secret key with the manufacture maintaining a database …