Industrial

  • Keyword Search

  • Post Date Range

Authorization

Authorization: Permission to Do Stuff

By Bryon Moyer | April 19, 2019 | 0 Comments

[From the last episode: We looked at the various kinds of keys and how they can interact for authentication and data encryption.] So far, we’ve focused on the first of three A-words: authentication. The whole point of authentication is to make sure that someone getting onto the network is who […]

Read More
Keys

So Many Kinds of Key!

By Bryon Moyer | April 12, 2019 | 0 Comments

[From the last episode: We looked at an example of how authentication ensures that, when you establish a secure web connection, everyone is who they say they are.] Let’s talk some more about keys. And I’ll warn you: as hard as I’m going to try to make things clear, you […]

Read More

Proving that You’re You

By Bryon Moyer | April 5, 2019 | 0 Comments

[From the last episode: We looked at different kinds of keys used for encryption.] Let’s say you want to connect to a website. Yeah, I know, we’re supposed to be talking about the IoT, but using a web browser is more familiar and it uses the same concepts. So we’ll […]

Read More
Keys

Different Kinds of Keys

By Bryon Moyer | March 29, 2019 | 0 Comments

[From the last episode: We looked at the notion of expressing text as a number and then multiplying by a key to encrypt it.] Last time we looked at a very primitive way of encrypting some text: by multiplying by a key. Some challenges with this approach immediately come to […]

Read More

Codes for Encryption

By Bryon Moyer | March 22, 2019 | 0 Comments

[From the last episode: We reviewed what we’ve already discussed for security, and laid the groundwork for the upcoming discussion.] Encryption is all about secret codes. There’s absolutely nothing new about it; we’ve been using codes for centuries, and kids still do it all the time. Just not at the […]

Read More
Site by Consistent Image Web Design