(Very) Basic Shamir’s Secret Sharing

By @wagslane (twitter) We use an algorithm called Adi Shamir’s secret sharing in order to share ownership of a secret among a group of participants. Then, in order to calculate the original secret, a minimum number of shares must be used. Example Problem To illustrate, let us imagine that a family of four shares a … Read more (Very) Basic Shamir’s Secret Sharing

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Many new developers are jumping right into coding (usually for those fat paychecks) without learning much about the history of Computer Science. People regarded Alan Turing as the father of Computer Science. He was first a cryptologist and mathematician. Then, he pioneered the field of CS in order to solve cryptological problems. In this article, … Read more Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

HMAC and MAC Explained Simply – Building Secure Auth With JWTs

HMACs and MACs are authentication codes and are often the backbone of JWT authentication systems. Let’s take a look at how they work! MAC – Message Authentication Code MACs are exactly what they sound like; small codes that allow receivers of messages to know who the sender was (authentication). A MAC code is calculated by … Read more HMAC and MAC Explained Simply – Building Secure Auth With JWTs

Stop with the Obfuscation: Encoding and Encryption are Not the Same

This is a topic that has been talked about quite a bit, but I think it’s an important one to reiterate to our users. Encoding is not Encryption! Encryption is a specific subset of encoding where the encoded messages can only be accessed by authorized parties (the ones holding the decryption keys). Encoding is simply … Read more Stop with the Obfuscation: Encoding and Encryption are Not the Same

Creating and Remembering a Strong Passphrase

We all have hundreds of online accounts. Ideally, as many of those accounts as possible have unique passwords. Unique passwords however present a difficult problem: No one can remember hundreds of strong passwords. To fix this problem, we created password managers. Now, all of our passwords are neatly stored in one place, encrypted by one … Read more Creating and Remembering a Strong Passphrase

Is AES-256 Quantum Resistant?

https://www.scienceandtechnologyresearchnews.com/the-race-to-build-a-quantum-computer/

With quantum computers getting more powerful every year, many worry about the safety of modern encryption standards. As quantum computers improve in performance and the number of qubits used for calculations increases, current cryptosystems are under more threat of attack. What will break? Many asymmetric encryption algorithms have been mathematically proven to be broken by … Read more Is AES-256 Quantum Resistant?

Randomness and Entropy in Node and Electron

http://thehobbyts.com/fun-dice-games-ultimate-list/

Randomness is a hard problem for computers. For this reason most functions that generate randomness are not considered cryptographically secure. That means that it is possible that an attacker can take a good guess at what number a non-secure randomness generator generated. How can randomness be attacked? Many non-secure randomness (or entropy) generators would do … Read more Randomness and Entropy in Node and Electron