Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills
The Triple Cyber Threat: Borat RAT
Introduction A one-way function is, by definition, a mathematical function that is easy to calculate but computationally difficult to invert. In other words, inverting a one-way function is equivalent to...
Today the quantum attacks threat is a real danger. The protection of data and communications is linked to technologies that give future-proof answers, capable of thwarting threats with still partially...
End-to-end encryption is a message encryption method based on asymmetric encryption algorithms and the decentralization of cryptographic keys. Is an encrypted communication system in which only people who are communicating...
Abstract The digital signature is, in many respects, the analogue in the digital world of the handwritten signature that we all use on a daily basis. The main difference between...
In a historical moment in which virtual meetings are becoming the main means of communication, both in the workplace and in the school environment, it is necessary and essential to...
Introduction Cryptography, understood as the set of information protection schemes, is typically divided into symmetric or private key cryptography and asymmetric or public key cryptography. Schemes or protocols that exploit...
The issue of mobile communication security highlights one of the weak links in the security chain of organizations. It is often the behavior of individual employees, not necessarily malicious but...
Leon Battista Alberti’s cipher disk, described in “De cifris” around 1467, is the first polyalphabetic encryption system. The device consists of two concentric discs, rotating relative to each other, containing...
Introduction Public key (or asymmetric) cryptography is one of the bases on which all communication protocols rest which, starting from an insecure channel, must achieve multiple security properties, such as...
In cryptography, the Caesar cipher is one of the oldest cryptographic algorithms of which there is a historical trace. It is a mono-alphabetic substitution cipher, in which each letter of...