Skip to content

Latest commit

 

History

History
88 lines (74 loc) · 5.58 KB

encryption.md

File metadata and controls

88 lines (74 loc) · 5.58 KB

Bookmarks tagged [encryption]

https://hat.sh/

hat.sh is a javascript app that provides secure file encryption using the AES-256-GCM algorithm from [WebCryptoAPI](https://www.w3.org...


https://www.pingidentity.com/en/company/blog/posts/2019/jwt-security-nobody-talks-about.html

In spite of the popularity of JWTs, their security properties are often misunderstood. To ensure the security of the app, you must fully consider asymmetric signatures, validation beyond signatures, c...


https://github.com/codahale/bcrypt-ruby

bcrypt-ruby is a Ruby binding for the OpenBSD bcrypt() password hashing algorithm.


https://github.com/cryptosphere/rbnacl

Ruby binding to the Networking and Cryptography (NaCl) library.


https://github.com/kigster/sym

A time-saving symmetric encryption gem based on OpenSSL that uses 256bit (password-encrypted) keys. Read the key from STDIN, a file, ENV or, on a Mac: OS-X Keychain.


http://rocketjob.github.io/symmetric-encryption/

Transparently encrypt ActiveRecord, Mongoid, and MongoMapper attributes. Encrypt passwords in configuration files. Encrypt entire files at rest.


https://medium.facilelogin.com/jwt-jws-and-jwe-for-not-so-dummies-b63310d201a3

Detailed explanation about jwt, jws and jwe


https://tools.ietf.org/html/rfc7515

Abstract

JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and id...


https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest

This article provides an overview of Microsoft Azure data encryption at-rest, the overall capabilities, and general considerations.


https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq

Digital signatures, a type of eSignature based on PKI standards, allow users to sign documents in compliance with country/industry-specific regulations.


https://www.youtube.com/watch?v=wXB-V_Keiu8

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation and time complexity.


https://www.youtube.com/watch?v=AQDCe585Lnc

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I'll explain this in plain English... Nice explanation