Avoid being a driveby victim — Stop convenient access to your data
More than 15 years ago Motorola's Information Protection Chief called his forward to our book, Cryptography Decrypted, e Everything —writing about eEverything good along with eEverything bad. (Noticeably) more true now than then.
To help deter attack we developed
DoCrypt Crypto Tools
the current US &
world-wide standard and DES (previous standard) for
message & file encryption –using password based or keyStore keys.
Crypto fingerPrinter for data authenticity and integrity
Logon–Password Manager stores web logon & password data
Key Store (aka
keychain, ring...) One of cryptography's main benefits is
one (1) key can protect all your other keys.
· Compare security of computer-made keys to human-made keys
· Evaluating vulnerabilities
· Compare secret key strengths ( DES–56, AES–128, 256 )
· How encryption can be corrupted
|4 computerized preComputer methods demonstrate / explain method and key,|
|–and how they evolved to AES.|
(more in program)
key creation & storage is done on your computer because...
...a computer that makes or shares your keys → can use your keys like you can.
*Even though one can always add more security, encryption is the best and
most simple way to protect your and our society's data from bad actors.