Public Key Cryptography
A very gentle introduction to public-private key cryptography from Computerphile. You’ll get the coolness and the basic concept about symmetric-asymmetric encryption works.
Hashing Algorithms and Security
Back again with the Computerphile and our favorite content creator, Tom Scott explaining the basics of hashing algorithm (like md5 and SHA) in a friendly way.
SHA: Secure Hashing Algorithm
We’ll using SHA256 encyption starting from this week. Why we don’t learn the basics?.
Prime Numbers & RSA Encryption Algorithm
RSA are using a large prime numbers, isn’t it interesting to know more about RSA?.
Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures
A short article about the sym and asym cryptography along with performance analysis and it’s vulnerabilities.
What are Digital Signatures?
Besides Udacity, here is a quick Youtube video about Digital Signature and it’s relation to public key.
Belajar Memakai GNU Privacy Guard (GnuPG/GPG)
This is just a simple and should be easy to understadn GnuPG tutorial in Indonesian :D.
periksadata.com
Data breaches could be a threat to our password, data, or even our identity. Teguh Aprianto a.k.a. @secgron and his fellow colleague create an Indonesian data breaches checker whether our data have been compromised using our email.
TED Talk:In the war for information, will quantum computers defeat cryptographers?
Cryptography and encryption is a vital subject in this war of information. This talk will give a broaden view of what’s coming.
Shor’s Algorithm Explained
Did we think our 256bit encryption is secure enough? Well, minutephysics tell us about an algorithm that can destroy even a 256bit encryption (well, we need a quantum computer for that too).