PinnedThe Cryptography Centre For ExcellenceCryptography Risk ManagementAccording to OWASP, Insufficient Cryptography has gone from being the fifth leading cause of security vulnerability in mobile applications…Dec 6, 2022Dec 6, 2022
The Cryptography Centre For ExcellenceProtecting sensitive data in a post-quantum eraWhat algorithms are considered quantum safe?Apr 25, 2023Apr 25, 2023
The Cryptography Centre For ExcellenceCryptography Q&A 2023What’s the biggest problem in cryptography today? Visibility and observability is the biggest problem when trying to secure modern…Jan 30, 2023Jan 30, 2023
The Cryptography Centre For ExcellenceThe non-existence of anonymity cryptocurrencies and money transfers.An anonymous system will never be scaled to the world. At best, an anonymous system forms a methodology for black markets and illegal…Jan 27, 2023Jan 27, 2023
The Cryptography Centre For ExcellenceSatoshi Nakamoto, and Digital ForensicsIntroductionJan 26, 2023Jan 26, 2023
The Cryptography Centre For ExcellenceAre my encryption keys stored within the cloud secure?Can the US government obtain access to my data within the cloud?Jan 13, 2023Jan 13, 2023
The Cryptography Centre For ExcellenceCould RSA 2048 and above really be cracked?Paper claims to break RSA-2048 with only 372 physical quibits.Jan 6, 2023Jan 6, 2023
The Cryptography Centre For ExcellenceHow blockchain technology utilizes cryptographyThe main features offered by Blockchain are:Dec 1, 2022Dec 1, 2022
The Cryptography Centre For ExcellencePreparing the roadmap towards post-quantum cryptographyOrganizations should now be actively taking steps, to prepare for the new post-quantum cryptography standards.Nov 10, 2022Nov 10, 2022