Limitations of Modern Cryptosystems
Before exploring quantum key distribution, it is important to understand the state of modern cryptography and how quantum cryptography may address current digital cryptography limitations. Since public...
View ArticleA Comparison between Subtree Encryption and Server side Access Control
SUBTREE ENCRYPTION Subtree encryption (element wise) is a good and straight-forward solution for XML Encryption and it will fit into most situations. The encrypted entity can be transferred to the...
View ArticleEncryption and Digital Signature
Digital signature The process of digitally signing starts by taking a mathematical summary (called a hash code) of the message. This hash code is a uniquely identifying digital fingerprint of the...
View ArticleC14N Denial of Service
Attack surface: Canonicalization Attack impact: Denial of service Description: C14N can be an expensive operation, requiring complex processing (Boyer ‟01), including entity expansion and normalization...
View ArticleMySQL’s Core Feature Set for Data Warehousing
MySQL contains a solid core feature set that is suitable for all data warehousing use cases. The following are just some of the features in the MySQL database server that help enable data warehousing:...
View ArticlePublic Key Cryptography
The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. Digital signatures use PKC (Public Key Cryptography), which employs an algorithm...
View Article
More Pages to Explore .....