Posted in Security Software

Elliptic Curve Cryptography: computing shared key

Elliptic Curve Cryptography: computing shared key

If Alice and Bob want to exchange encrypted messages, they need to first agree on a Key. This shared key (also known as symmetric key) will be used to by both parties to encrypt messages. There are many ways of arriving at the shared key (including the old fashioned ... read more

Continue Reading...
Posted in Software

Monkey business — write once, deploy on iOS, Android and Windows with Xamarin

Microsoft and Nokia missed the boat on tablets and smartphones. Microsoft’s Surface RT tablets were priced very high, and there were not many takers, with the result that Microsoft wrote off 900 million dollars as inventory adjustment. Nokia Lumia line with Windows Phone OS has been well received. Microsoft has bought Nokia’s struggling phone business. ... read more

Continue Reading...
Posted in Software

Blog and more for less than the price of 2 lattes — DigitalOcean

VPS (Virtual private server) hosting that costs less than typical shared-hosting? Sounds too good to be true? I wondered about this and raised this issue a while back on the forum and got replies from the management and comments from others.

It is true. The VPS provider is the relatively newer kid on the block ... read more

Continue Reading...
Posted in Security Software

Perils of Unreachable Code — was it deliberate?

There is no substitute for detailed code reviews, more so if the code is related to security. Any changes to such code, however minor, should be reviewed. However, in addition, it also helps if the compiler, tools etc can help in flagging potential errors.

Take the case of the very serious security error in ... read more

Continue Reading...