Digital Signature Algorithm
What is a digital signature? In the physical world, document verification is done through signatures. For example, if you send me a document with your signature, I trust its authenticity…
What is a digital signature? In the physical world, document verification is done through signatures. For example, if you send me a document with your signature, I trust its authenticity…
RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. It's also used in TLS handshake. The foundation of RSA lies in asymmetric encryption, where a key…
In the preceding sections, we explored the concept and properties of Elliptic Curve Finite Fields. In this topic, we dive into an application of the Elliptic-Curve Diffie–Hellman (ECDHE) which is…
In the previous topic, we already know what is Elliptic Curves. Now, we go further with the Elliptic Curves Over Finite Fields. Modulo \( \text{When a number modulo a number…
I wrote this series because I am inquisitive about some strange things in the TLS series. Elliptic-curve Diffie–Hellman (ECDHE) is one of them. Please check TLS-part 1 to get the details.…
What is WolfSSL? If you are an embedded developer, you might be familiar with mbedTLS, a widely used TLS library for embedded systems. However, mbedTLS is not the only option.…
When developing or testing a website or application that requires secure communication over HTTPS, you might need a certificate to encrypt the data and authenticate the server. However, obtaining a…
Have you ever wondered how two parties can securely communicate online without revealing their secrets to anyone else? How can they agree on a common key to encrypt and decrypt…
What is Transport Layer Security (TLS)? Transport Layer Security or TLS is an encryption protocol designed to secure internet communications. TLS is the upgraded version of SSL. Many use cases…