Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Tag Archives | authentication

Cryptographic Modes of Operation

Cryptographic Modes of Operation Electronic Code Book (ECB) Cipher Block Chaining (CBC) Cipher Feedback (CFB) Output Feedback (OFB) Counter (CTR) Galois/Counter (GCM) Counter with Cipher Block Chaining Message Authentication Code (CCM)   External Resources  ”CISSP Official Study Guide Ninth Edition”, Mike Chaple, James Michael Stewart, Darril Gibson; Sybex; 2021; Chapters 6 “Cryptography and Symmetric Key […]

Comments { 0 }

Fingerprint Recognition

Fingerprint recognition needs to steps: Fingerprint registration Fingerprint authentication During fingerprint registration, the fingerprint image(s) are converted into what is called Fingerprints Minutiae Data (FMD). FMD is saved into the database, not the fingerprint image itself. During fingerprint authentication, fingerprint image is converted into FMD. Aftewards, the registered FMD and the recently obtained FMD are […]

Comments { 0 }

Websites where Spanish FNMT Digital Certificate can be used for Authentication

This is a non-exhaustive list of websites that accept the digital certificate from Spanish Royal Mint (FNMT, from the Spanish Fábrica Nacional de Moneda y Timbre) as a method of authentication.   List of websites where Spanish FNMT Digital Certificate can be used for Authentication Spanish Tax Agency https://www2.agenciatributaria.gob.es Spanish Tax Agency (Agencia Tributaria, in […]

Comments { 0 }

Encryption Algorithms

    Symmetric Key Cryptographic Systems Data Encryption Standard (DES) Triple DES (3DES) Advanced Encryption Standard (AES) Rivest Ciphers (RC) family RC4 RC5 RC6 Blowfish Twofish International Data Encryption Algorithm (IDEA) Skipjack CAST family CAST-128 CAST-256 Serpent Camellia Kuznyechik Asymmetric Key Cryptographic Systems Rivest Shamir Adleman (RSA) Merkle-Hellman Knapsack Elliptic Curve Cryptography (ECC) Diffie-Hellman ElGamal […]

Comments { 0 }

Encryption Concepts for IT

This post tries to summarize the basic concepts of cryptography and encryption that are relevant to information technologies, computer science and cybersecurity. It tries to focus on the basic concepts. Technical details about mathematics, calculations or implementations (like encryption algorithms or digital certificate distribution) have been left for different posts.   Definitions and objectives of […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional