Podcast Mar 27, 2023
Root Causes 289: What Is a Cryptographic Center of Excellence?
We define the cryptographic center of excellence, how such a center of excellence would work, and the benefits it brings to an enterprise.
Podcast Jan 04, 2023
Root Causes 266: End-to-end Encryption in the Apple Technology Stack
Recent announcements from Apple lay out a set of expansions in the scope and capability of encryption throughout the Apple ecosystem.
Blog Post Jul 07, 2021
The Secure Hash Algorithms (SHA) is a hashing algorithm that is used to encrypt data. It's essential for any online business to understand what SHA is, how it works, and the different types available.
Podcast Mar 31, 2021
Root Causes 159: Encrypted Communication Provider Indicted
The CEO of an encrypted data devices and services provider has been indicted on RICO charges related to drug trafficking and money laundering.
Podcast Mar 08, 2021
Root Causes 154: Did Claus Peter Schnorr Just Break RSA?
A recently published paper claims to have destroyed the RSA algorithm, but many people are skeptical.
Podcast Feb 16, 2021
Root Causes 150: This Podcast Is Not About Alan Turing
We discuss Enigma, history's most famous code system, how it was broken, and how that relates to cryptography today.
Blog Post Jan 05, 2021
Learn about RSA, DSA, & ECC (Elliptic Curve Cryptography) encryption, their differences, performance similarities & how to know which one you need.
Podcast Dec 17, 2020
Root Causes 136: 2020 Lookback - Quantum Safe Certificates
We discuss 2020's progress in the quest for quantum-safe encryption, including the algorithm candidate list, hybrid certificates, and IoT devices.
Podcast Oct 01, 2020
Root Causes 123: Asymmetric Versus Symmetric Encryption
PKI and digital certificates depend on asymmetric encryption. Learn the difference between asymmetric and symmetric secrets & how they fit into encryption.