Discover Cryptography News

The Linux Kernel Module Programming Guide: Crypto

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To handle cryptography, the Linux kernel has its own API enabling common methods of encryption, decryption and your favourite hash functions! Learn about the use of hash functions and symmetric key encryption in the Linux kernel in the Linux Kernel Module Programming Guide.

The What, Why & How of SSH Protocol

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Modern challenges require modern security approaches." Enterprises must transition to using passwordless solutions in order to protect against emerging threats – which is where SSH key-based authentication comes in handy. Learn about the SSH protocol in this comprehensive article.