Tagged articles
15 articles
Page 1 of 1
dbaplus Community
dbaplus Community
Apr 9, 2026 · Information Security

Designing Practical Encrypted Storage for Sensitive User Data

This article explains why encrypting sensitive fields like passwords, phone numbers, and ID numbers is essential, details a balanced approach using AES‑GCM encryption, HMAC indexes, and masked fields, and shares real‑world lessons from implementing the solution in a production system.

AES-GCMDatabase designHMAC
0 likes · 21 min read
Designing Practical Encrypted Storage for Sensitive User Data
Ray's Galactic Tech
Ray's Galactic Tech
Nov 2, 2025 · Information Security

How to Secure Third‑Party API Calls with TLS, HMAC Signatures & RSA Encryption

To protect sensitive data in third‑party API integrations, this guide outlines a three‑layer security architecture—mutual TLS for channel protection, HMAC‑based request signing for integrity, and RSA encryption for data confidentiality—plus key management, monitoring, performance considerations, and implementation roadmaps.

API SecurityHMACRSA
0 likes · 10 min read
How to Secure Third‑Party API Calls with TLS, HMAC Signatures & RSA Encryption
Efficient Ops
Efficient Ops
Feb 8, 2023 · Information Security

Why Sessions Burden Servers and How Token‑Based Authentication Solves It

This article traces the evolution from simple web page browsing to modern token‑based authentication, explaining the scalability and security problems of server‑side sessions and showing how signed, stateless tokens using HMAC‑SHA256 eliminate those issues while supporting horizontal scaling and cross‑platform access.

HMACSession ManagementWeb Security
0 likes · 13 min read
Why Sessions Burden Servers and How Token‑Based Authentication Solves It
MaGe Linux Operations
MaGe Linux Operations
Jul 24, 2021 · Information Security

Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained

This article introduces common encryption algorithms—including symmetric, asymmetric, and digital signature methods—and provides detailed Go code examples for MD5, HMAC, SHA1, AES (with various modes), and RSA, helping developers understand and implement secure cryptographic operations in Go.

AESHMACMD5
0 likes · 16 min read
Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained
Efficient Ops
Efficient Ops
Oct 14, 2020 · Information Security

Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication

This article traces the evolution from early stateless web browsing to modern token‑based authentication, explaining how session management challenges led to centralized stores, their drawbacks, and how signed tokens using HMAC‑SHA256 provide a scalable, secure, and truly stateless alternative.

AuthenticationHMACSession
0 likes · 15 min read
Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication
Fulu Network R&D Team
Fulu Network R&D Team
Jun 29, 2020 · Information Security

Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle

This article introduces various cryptographic primitives—including MD, SHA, MAC, and digital signature algorithms such as RSA, DSA, and ECDSA—explains their usage and security considerations, and provides complete .NET Core code examples using the BouncyCastle library for implementation.

.NET CoreBouncyCastleECDSA
0 likes · 24 min read
Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle
Top Architect
Top Architect
Jun 19, 2020 · Information Security

Evolution of Session Management and Token‑Based Authentication

The article traces the history of web session handling, explains the scalability and security challenges of server‑side sessions, and introduces stateless token‑based authentication using signed HMAC‑SHA256 tokens as a modern solution for scalable, secure web applications.

HMACSessionToken
0 likes · 14 min read
Evolution of Session Management and Token‑Based Authentication