ICMC 2018 presentation

I was honored to present at the International Cryptographic Module Conference (ICMC) in Ottawa in May.  I presented along with […]

ROBOT Attacks TLS_RSA ciphers

A nearly twenty year old vulnerability in SSL using RSA for encryption has been retooled to exploit current implementations of […]

Recommended TLS Ciphers

Use: TLS v1.1 and 1.2 Avoid: TLSv1.0 or lower or SSLv3 or lower Note: TLSv1.0 is susceptible to the BEAST […]

Speaking at Triangle InfoSeCon

Not to be missed!  I am speaking at the Triangle InfoSeCon in October.  I will be presenting on the Johns […]

DRBG and RNG

No matter how good your algorithm and key sizes are, a bad random number generator means your cryptography will fail.  […]

IPsec Algorithms

Use: AES-CTR-128, AES-CTR-256, AES-GCM-128, AES-GCM-256 Avoid: AES-CBC-128, AES-CBC-256 IKEv1 Phase 1 exchanges use only main mode IKEv1 and IKEv2 SA […]