Magnus K Karlsson

I'm dedicated agile security architect/system architect/developer with specialty of open source framework.

December 7, 2017

Crypto Key Length

keylength.com

at December 07, 2017
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Magnus K Karlsson
Jag arbetar sedan 2016 på Antigo med IT-säkerhet, systemarkitektur och utveckling. Där arbetar jag inom branscher som Myndighet, Finansiell handel och Media. Tidigare har jag arbetat inom Transport och Telekom branscher.

Men det jag brinner för är enkla och lättrörliga arkitekturlösningar. Mitt motto är: när det inte går att förenkla en lösning mera, så är man klar.

Privat så är jag en stolt trebarnspappa, som tycker om aktivt umgänge med vänner och familjer, som segling, golf och vandring i skog och natur.

Credly Magnus Karlsson

CISSP, CCSP
RHCA, RHCE, RHCSA, RHCS{
 - Security: Linux
  - MultiCluster Management
  - OpenShift Automation and Integration
  - OpenShift Application Development
  - OpenShift Administration
  - Containers and Kubernetes}
Spring Certified Professional 2023
SC{EA, WCD, JD, JP}
View my complete profile

Search This Blog

Blog Archive

  • ►  2024 (10)
    • ►  August (8)
    • ►  July (2)
  • ►  2023 (16)
    • ►  September (2)
    • ►  August (9)
    • ►  July (1)
    • ►  January (4)
  • ►  2022 (57)
    • ►  November (7)
    • ►  October (12)
    • ►  September (1)
    • ►  July (31)
    • ►  June (4)
    • ►  May (2)
  • ►  2021 (15)
    • ►  June (1)
    • ►  May (3)
    • ►  April (1)
    • ►  March (9)
    • ►  February (1)
  • ►  2020 (14)
    • ►  November (11)
    • ►  March (1)
    • ►  February (2)
  • ►  2019 (40)
    • ►  December (3)
    • ►  November (2)
    • ►  October (9)
    • ►  September (6)
    • ►  August (7)
    • ►  June (5)
    • ►  May (1)
    • ►  April (4)
    • ►  March (2)
    • ►  February (1)
  • ►  2018 (57)
    • ►  November (9)
    • ►  October (32)
    • ►  July (1)
    • ►  June (1)
    • ►  May (8)
    • ►  April (3)
    • ►  March (1)
    • ►  February (2)
  • ▼  2017 (83)
    • ▼  December (23)
      • The Kerberos Protocol
      • Install and Configure Postfix
      • SELinux
      • op5
      • check_log
      • Block Cipher (Encryption) Cheat Sheet
      • SSL/TLS Attacks
      • Crypto Key Length
      • Crypt Libraries
      • Crypto Attacks Side-Channel Attacks
      • Comparing Elliptic-Curve Cryptography (ECC) and RSA
      • Diffie–Hellman key exchange (DH)
      • Asymmetric Encryption with RSA and OAEP (Optimal A...
      • Asymetric RSA Trapdoor Permutation
      • Symmetric Authenticated Encryption (AE) or Authent...
      • Block Cipher - Encrypt More Than 1 Block
      • Hash Functions Cheat Sheet
      • RNG/DRBG/PRNG Cheat Sheet
      • How to Test Randomness (Entropy)
      • Random in Linux
      • Cryptographically Secure Pseudo-Random Number Gene...
      • Ubuntu 16.04 Disk Usage Analyzer
      • Getting Started with Python on Ubuntu 16.04
    • ►  November (24)
    • ►  October (1)
    • ►  September (1)
    • ►  July (3)
    • ►  June (4)
    • ►  May (11)
    • ►  March (3)
    • ►  January (13)
  • ►  2016 (75)
    • ►  December (1)
    • ►  November (11)
    • ►  September (14)
    • ►  August (8)
    • ►  July (4)
    • ►  June (18)
    • ►  May (2)
    • ►  April (3)
    • ►  March (14)
  • ►  2015 (31)
    • ►  December (4)
    • ►  September (1)
    • ►  August (4)
    • ►  July (4)
    • ►  June (2)
    • ►  May (1)
    • ►  March (4)
    • ►  February (10)
    • ►  January (1)
  • ►  2014 (73)
    • ►  December (10)
    • ►  October (1)
    • ►  August (7)
    • ►  June (10)
    • ►  May (1)
    • ►  April (5)
    • ►  March (25)
    • ►  February (3)
    • ►  January (11)
  • ►  2013 (68)
    • ►  December (10)
    • ►  November (11)
    • ►  October (4)
    • ►  August (4)
    • ►  July (1)
    • ►  June (7)
    • ►  May (5)
    • ►  March (1)
    • ►  February (3)
    • ►  January (22)
  • ►  2012 (39)
    • ►  December (2)
    • ►  November (5)
    • ►  September (2)
    • ►  August (4)
    • ►  July (4)
    • ►  June (5)
    • ►  May (3)
    • ►  April (4)
    • ►  March (3)
    • ►  January (7)
  • ►  2011 (6)
    • ►  November (4)
    • ►  February (2)
  • ►  2010 (23)
    • ►  October (8)
    • ►  August (1)
    • ►  July (2)
    • ►  June (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (7)
    • ►  January (1)
  • ►  2009 (38)
    • ►  December (2)
    • ►  November (5)
    • ►  October (5)
    • ►  September (1)
    • ►  August (4)
    • ►  July (4)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (7)
    • ►  January (7)
  • ►  2008 (6)
    • ►  December (1)
    • ►  October (5)

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Followers

  • How to Setup and Use Artifactory as Proxy/Mirror for Remote Repositories
    In this blog I will discuss and show you how to setup and use Artifactory as proxy (mirror) for remote repositories, such as Central Maven ...
  • Entity Control Boundary (ECB) Pattern
    Introduction The Entity Control Boundary (ECB) pattern is and old pattern that was published by Ivar Jacobson (Ericsson Co.) in 80's. ...
  • How to Read PEM PKCS#1 or PKCS#8 Encoded Private Key In Java
    import java.io.InputStream; import java.math.BigInteger; import java.nio.file.Files; import java.nio.file.Paths; import java.security.KeyFa...

StatCounter

Simple theme. Powered by Blogger.