Tagged articles
2 articles
Page 1 of 1
OPPO Amber Lab
OPPO Amber Lab
Oct 26, 2020 · Information Security

Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD

This article introduces essential cryptography fundamentals for programmers, covering public‑key encryption, key‑exchange protocols, digital envelopes, signatures, certificates, hash functions, MACs, and authenticated encryption with associated data, while highlighting practical security considerations.

AEADdigital signaturehash function
0 likes · 5 min read
Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD
DevOps
DevOps
Apr 17, 2016 · Information Security

Understanding HTTPS and RSA Encryption Through a Browser Dialogue

This article uses a playful conversation between browsers and a reporter to explain how HTTPS secures web traffic by employing RSA public‑key encryption, digital signatures, certificate authorities, and the challenges of performance and man‑in‑the‑middle attacks, ultimately showing why modern browsers adopted HTTPS by default.

Browser SecurityCertificate AuthorityHTTPS
0 likes · 8 min read
Understanding HTTPS and RSA Encryption Through a Browser Dialogue