About 50 results
Open links in new tab
  1. SSH Server Configuration Best Practices? - Information Security Stack ...

    Dec 3, 2021 · 0 For me ssh.com is a good reference. If you want specific SSH server best practices it's the place to go to. There's also a section on cryptography policy. For cryptographic mechanisms to …

  2. encryption - is this a good practice for storing private keys ...

    Nov 16, 2020 · In a crypto exchange, the users don't have private keys, they have passwords for their accounts, like an email, or bank account. Think of a bank: the users usually don't have a private safe …

  3. cryptography - Information Security Stack Exchange

    Sep 8, 2012 · Your best case is to use a high-level well-vetted scheme: for communication security, use TLS (or SSL); for data at rest, use GPG (or PGP). If you can't do that, use a high-level crypto library, …

  4. Is password-based encryption better than traditional password hashing ...

    Feb 25, 2025 · I have a theoretical question regarding the comparison of password-based encryption and password hashing. Not sure if Stackoverflow or crypto is the best place, but this is more on the …

  5. "Diffie-Hellman Key Exchange" in plain English

    Mar 5, 2021 · Can someone explain what the Diffie-Hellman Key Exchange algorithm in plain English? I have read that Twitter has implemented this technology which allows two parties to exchange …

  6. encryption - Information Security Stack Exchange

    Aug 31, 2021 · I believe a company would be doing themselves a major disservice if they were not using a multi-signature scheme to protect their important funds. Each withdrawal from the company funds …

  7. Why shouldn't we roll our own? - Information Security Stack Exchange

    Why shouldn't we create our own security schemes? I see a lot of questions around here about custom crypto and custom security mechanisms, especially around password hashing. With that in mind, I'm

  8. encryption - Information Security Stack Exchange

    Nov 21, 2024 · Strong authentication and (client-side) data encryption aren't mutually exclusive. You definitely should implement an authentication mechanism in the backend before you hand out any …

  9. tls - Information Security Stack Exchange

    May 23, 2020 · So what is today the best choice for certificate key algorithms and key sizes for server certs (old internet explorer not required but PCs, tablets, mobile phones being used today should be …

  10. key management - Information Security Stack Exchange

    Apr 7, 2018 · I am looking for best practices regarding TLS private key storage for small single chip embedded systems, such as Cortex-M MCUs, with monolithic firmware stored in internal flash. Most …