Cryptography is a complex and quickly-evolving field. Nonetheless, it is also an essential component of most of today's communication tools.
Although current state-of-the art offers several robust, well-studied cryptographic primitives, these primitives are only basic building blocks, which still have to be put together in a consistent and well-thought manner. Correctly deploying cryptographic tools is a very complex task, and the slighest mistake may render the complete effort void. Moreover, it is a well-known fact that bad cryptography is worse than no cryptography at all. Using a strong 2048-bit RSA may give a comfortable feeling of security. Yet, if the secret key is improperly generated, breaking the protocol may be piece of cake for the decided adversary. Our experience taught us that every need is different, and that many problems are too specific for an appropriate out-of-the-box solution to be available.
Modern cryptography is also one of the most quickly evolving research fields today. Almost everyday new attacks get published, showing how using such or such primitive under such conditions leads to unexpected flaws, how this parameter range is inappropriate, how this protocol, yet unbroken for several years, was finally completely turned down. Although in most fields, ignoring recent discoveries yields to sub-optimal, but exploitable results, this is of course not the case with security: no one can afford ignoring a new attack.An up-to-date level of expertise in cryptography is expensive and time-consuming to maintain. K2Crypt can do it for you.
Secure Hash Standard (SHS)
SHA-1 Broken: Collision Attack Found, Implications for Cryptography
ahs_agenda.html
about_riemann.html
76.html
75.html
74.html
73.html
72.html
70.html
60.html
50.html
What Is Our Methodology?
Security Courses, Cryptography Consulting, System Evaluation & TTP Services
Bridging The Gap Between Scientific Research And Industry Needs