Tutorials

How does SSL/TLS work - part four

Like any secure protocol, vulnerabilities will continue to be discovered, and it is important to keep software that utilises TLS up-to-date so that the latest security patches are applied.

5 min read Read More

What are digital certificates?

In How does public key encryption work?, it was explained that there needs to be a way of reliably associating public keys with their owners. Using someone's public key to …

7 min read Read More

What is encryption?

The first post in our series about new secure network protocols concerns the most important concept required for understanding security, encryption.

5 min read Read More

How does public key encryption work?

Public key encryption is briefly explained in the first post of this series, here, but it is of such importance in SSL/TLS and SSH that a more detailed explanation is …

7 min read Read More

New blog series on secure network protocols

This blog series will explain how secure network protocols work. It will explain what encryption is, what cryptographic hashes are, and how they are both used to secure data transmission. …

3 min read Read More