Cryptography is a complex and quickly-evolving field. Nonetheless, it is also an essential component of most of today's communication tools.
Although current state-of-the art offers several robust, well-studied cryptographic primitives, these primitives are only basic building blocks, which still have to be put together in a consistent and well-thought manner. Correctly deploying cryptographic tools is a very complex task, and the slighest mistake may render the complete effort void. Moreover, it is a well-known fact that bad cryptography is worse than no cryptography at all. Using a strong 2048-bit RSA may give a comfortable feeling of security. Yet, if the secret key is improperly generated, breaking the protocol may be piece of cake for the decided adversary. Our experience taught us that every need is different, and that many problems are too specific for an appropriate out-of-the-box solution to be available.
Modern cryptography is also one of the most quickly evolving research fields today. Almost everyday new attacks get published, showing how using such or such primitive under such conditions leads to unexpected flaws, how this parameter range is inappropriate, how this protocol, yet unbroken for several years, was finally completely turned down. Although in most fields, ignoring recent discoveries yields to sub-optimal, but exploitable results, this is of course not the case with security: no one can afford ignoring a new attack.An up-to-date level of expertise in cryptography is expensive and time-consuming to maintain. K2Crypt can do it for you.
Secure Hash Standard (SHS)
SHA-1 Broken: Collision Attack Found, Implications for Cryptography
NIST is issuing a tentative agenda for the development of a SHA successor
Does the proof of the Riemann hypothesis really bring the whole of ecommerce to its knees?
The Cost of Insecurity: Understanding the “Non-Loss” Benefit of Cryptography
The Cost of “Just Enough” Security: Why Good Cryptography isn’t More Expensive
Cryptographer Consulting: Security Transparency vs. Relying on Ourselves
Why do people believe they should handle cryptography themselves?
The Illusion of Simplicity: Why Designing Your Own Cryptography Fails
Why Do I Need a Cryptographer?
Founding Members
Academic and Historical References
What Is Our Methodology?
Security Courses, Cryptography Consulting, System Evaluation & TTP Services
Bridging The Gap Between Scientific Research And Industry Needs