Tagged articles
4 articles
Page 1 of 1
Huolala Tech
Huolala Tech
Apr 9, 2024 · Mobile Development

How to Securely Add Fingerprint & Face ID Login to Your iOS App with ECDSA

This article walks through the design, security considerations, and step‑by‑step implementation of fingerprint and face‑recognition login for an iOS driver app, covering biometric enable/disable, server‑side verification, auth‑code replay protection, ECDSA signing, keychain management, and common pitfalls.

BiometricsECDSAKeychain
0 likes · 22 min read
How to Securely Add Fingerprint & Face ID Login to Your iOS App with ECDSA
Programmer DD
Programmer DD
Apr 22, 2022 · Information Security

Java ECDSA Bug Lets Attackers Forge SSL Certificates – What You Must Do

Oracle’s recent security update patches a critical Java vulnerability (CVE‑2022‑21449) that lets attackers forge SSL certificates, bypass two‑factor authentication, and create fraudulent digital signatures by exploiting a flaw in the ECDSA implementation of Java 15‑18, a bug rated as a crypto‑bug of the year.

CVE-2022-21449ECDSASecurity Vulnerability
0 likes · 6 min read
Java ECDSA Bug Lets Attackers Forge SSL Certificates – What You Must Do
Fulu Network R&D Team
Fulu Network R&D Team
Jun 29, 2020 · Information Security

Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle

This article introduces various cryptographic primitives—including MD, SHA, MAC, and digital signature algorithms such as RSA, DSA, and ECDSA—explains their usage and security considerations, and provides complete .NET Core code examples using the BouncyCastle library for implementation.

.NET CoreBouncyCastleECDSA
0 likes · 24 min read
Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle