Cryptography

The NSA’s Simon and Speck: Trust versus Security

I wanted to share an interesting development in the NSA’s quest to have their lightweight cryptographic tools (i.e., tools for constrained environments such as Internet of Things (IoT) and implanted medical devices (IMD)) “Simon” and “Speck” adopted by the International Organization for Standards (ISO – ever wonder why it’s ISO instead of IOS, ISO provides […]

The NSA’s Simon and Speck: Trust versus Security Read More »

RIP SHA-1

It’s official. SHA-1 has been broken. As reported on pretty much every tech-focused news source and blog yesterday, two PDFs were created resulting in identical SHA-1 hashes. For years, security experts and cryptographers from industry to government, have warned against the use of SHA-1 as it was theoretically broken, just not practically (well…that we know

RIP SHA-1 Read More »

HMAC Verification

Hashed message authentication codes (HMAC) are a type of message authentication code employing a cryptographic hash function and secret key. It provides message integrity (via the hash function and encryption) and authentication (via encryption). It does not provide non-repudiation, as it uses a symmetric key which anyone can use to sign a message (no guarantee

HMAC Verification Read More »