Archives for encryption
Installing certbot on an EC2 using AWS Systems Manager
Registering the certbot client and requesting a certificate - sudo yum -y install yum-utils - sudo yum -y install - sudo yum-config-manager --enable rhui-REGION-rhel-server-extras rhui-REGION-rhel-server-optional - sudo yum -y install certbot - sudo certbot register --server {{ CertServerUrl }} -m {{ contactEmail }} --no-eff-email - sudo certbot certonly --server {{ CertServerUrl }} --cert-name {{ certName }} -d {{ certDomains }} --webroot-path {{ webrootPath }} > / The terraform file () # input variables variable "instance_ids" { type = list default = } variable "cert_common_name" { type = string default = "avTestCert" }…
Tokenization versus Encryption vs Data Masking
Tokens are pointers to data - and substitute data (not transform it) Tokenization Pros Use Cases - PCI Data - Credit Card info etc. Tokenization reduces the in-house responsibility of…
Why do we need certificates at all in PKI?
The public key that is used to send someone a message (for example - if someone wants to send me a message, they will use my public key - so…
Extracting the Private Key and the Cert Bundle from a PFX file
You've been handed a PFX file and asked to get the .key file (the private key) and a new cert bundle (.crt) out of it Step 1 Install OpenSSL on…
Diffie Helman, Symmetric and Asymmetric Encryption
Symmetric Encryption has two potential drawbacks. The first of these is the commonly known Man in the Middle attack. The second is a limitation on reuse. Man in the Middle…
CSR , TBSCertificate and Private Keys
Do I need to send (or even possess) a private key to request an SSL Certificate? Believe it or not, no - you do not need to even possess the…
Tokenized Identity Use Cases
If a physical token ( , Passport) is used to prove identity, it is secure. When we move to digital tokens, it becomes a little easier to 'lease' your identity.…
Brute Force Breaking of Encryption – Solution Scheme
One of the more interesting approaches to preventing brute force cracking is to actually use MULTIPLE private keys that all map to the SAME public key. Now, only ONE of…
Encryption and Signing – Same Key Pair – or different key pairs?
Most articles and even textbooks assume that the same key pair will be used for encryption as for signatures. However, there is absolutely no reason this has to be the…