Learn about the advantages of symmetric cryptography enhances blockchain speed, efficiency, and scalability for handling large data volumes.| Tutorials
Earlier this year, I wrote about planned effort to design a federated Key Transparency proposal. The end goal for this work was constrained to building end-to-end encryption into a new type of Dire…| Dhole Moments
Cryptography is the study of securing communications from outside observers. It comes in several different forms, including symmetric, asymmetric, and hashing.| Encryption Consulting
Four years ago, I wrote a (surprisingly popular) blog post about the notion of wear-out for symmetric encryption schemes. Two years ago, I wrote a thing about extending the nonce used by AES-GCM wi…| Dhole Moments
Head’s up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly a…| Semantically Secure
In June 2023, Amazon Web Services launched a developer preview of the new Database Encryption SDK in Java for DynamoDB (DB-ESDK for short). The DB-ESDK is the successor to the DynamoDB Encryption C…| Semantically Secure
I am famously not a fan of JSON Web Tokens (JWT). Like most cryptography and security experts familiar with JWT, I would much rather you use something else if you can. I even proposed a secure alte…| Semantically Secure