ECDH and CEK (Content Encryption Key) using COSE and CBOR

In computer security, we often have to represent binary data, in single values or groups of characters, bytes, words, long words, signed integers, floating-point values, double-precision floating-point values, and so on. This might be in the form of a data object, a signature or even encrypted content. For this, the ANS.1 DER format is often used, such as presenting digital certificates and…

This publication brings together interesting articles related to cyber security.

Recommended from Medium

IT Executive Sam Tenorio III Explores the Benefits of Edge Computing

A Number by Any Other Entropy

Data Governance Tools and Threat Intelligence for Microsoft Office 365

Cognitive Identification — your future Identity

Nmap HTTP Enumeration:

Is your school system data at risk? What you need to know about Cyber Security and Education

Get your Halloween BurgerSwap NFT’s 😈

Data Privacy is a Business Responsibility -

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Elliptic Curves, Base Points and Scalars

Everything You Want To Know About AES, But Were Afraid To Ask …

Cracking Elliptic Curves Using Pairing and Kryptology

Doing What It Says on The Crypto Tin: Verified Cryptography Code For Everyone