Go Public and Symmetric Key? The Best of Both Worlds: ECIES

Many encryption systems are compromised because they generate their encryption key using a passphrase, and which can considerably reduce the overall security infrastructure. A passphrase which is taken from a standard dictionary, for example, might reduce the key strength from 256 bits to just 20 bits (for a list of around one million words).




This publication brings together interesting articles related to cyber security.

Recommended from Medium

$10,000 for a vulnerability that doesn’t exist

Weekly Cybersecurity Review July 24–30

4 Steps for Starting Your Cybersecurity Strategy from Scratch

Why Was Facebook Fined $122 Million in the EU, But Not in the US?

If you have Cryptos, you must know about this Virus

How Important Is Cyber Security?

Downtime Dangers - why disruption is not always a good thing

Protecting What It Means To Be Human Online

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

NIZK (Non-interactive Zero Knowledge) Proofs of Discrete-log Equality

Towards Zero Trust: Meet The YubiKey

Using YubiKey to Protect Email With MFA