Security

  • Keyword Search

  • Post Date Range

Hash

Hashing and Digital Signatures

By Bryon Moyer | April 26, 2019 | 0 Comments

[From the last episode: We looked at authorization – the permissions that different people or things have to see things on the network.] Let’s say that your IoT device sends a message to a server. Let’s say it’s a refrigerator, and it’s sending the message that you’re out of milk. […]

Read More
Authorization

Authorization: Permission to Do Stuff

By Bryon Moyer | April 19, 2019 | 0 Comments

[From the last episode: We looked at the various kinds of keys and how they can interact for authentication and data encryption.] So far, we’ve focused on the first of three A-words: authentication. The whole point of authentication is to make sure that someone getting onto the network is who […]

Read More
Keys

So Many Kinds of Key!

By Bryon Moyer | April 12, 2019 | 0 Comments

[From the last episode: We looked at an example of how authentication ensures that, when you establish a secure web connection, everyone is who they say they are.] Let’s talk some more about keys. And I’ll warn you: as hard as I’m going to try to make things clear, you […]

Read More

Proving that You’re You

By Bryon Moyer | April 5, 2019 | 0 Comments

[From the last episode: We looked at different kinds of keys used for encryption.] Let’s say you want to connect to a website. Yeah, I know, we’re supposed to be talking about the IoT, but using a web browser is more familiar and it uses the same concepts. So we’ll […]

Read More
Keys

Different Kinds of Keys

By Bryon Moyer | March 29, 2019 | 0 Comments

[From the last episode: We looked at the notion of expressing text as a number and then multiplying by a key to encrypt it.] Last time we looked at a very primitive way of encrypting some text: by multiplying by a key. Some challenges with this approach immediately come to […]

Read More
Site by Consistent Image Web Design