The Inner Circle

 View Only
  • 1.  #TechTopicTuesday

    Posted Oct 18, 2022 06:12:00 AM

    This week’s Word of the Week is: Asymmetric Encryption! Asymmetric Encryption is a relatively new encryption method that uses mathematically linked public and private key pairs to encrypt and decrypt data between trusted parties.

    Because symmetric encryption only uses a single key, anyone who steals or copies that key can easily decrypt data and communications. In contrast, the asymmetric encryption model allows for freely sharing the public key, with the private key strictly controlled and protected by the key pair owner. Learn more about asymmetric encryption and more cloud key management techniques in this blog → https://csaurl.org/qrgx7s

    #cloudsecurity #CKM #riskmanagement



    ------------------------------
    Orbert Reavis
    Circle Guide
    CSA
    ------------------------------


  • 2.  RE: #TechTopicTuesday

    Posted Oct 19, 2022 08:48:00 PM
    Relatively new??? Yeah, and I am relatively young too!

    Asymmetric encryption, aka public-key cryptography, dates back to the 1970s, almost 50 years ago. At the speed at which the computing field evolves, this is ancient. See Public-key cryptography - Wikipedia.

    ------------------------------
    Claude Baudoin
    cébé IT Knowledge Management
    Co-Chair, OMG Cloud Working Group
    https://www.omg.org/cloud
    ------------------------------



  • 3.  RE: #TechTopicTuesday

    Posted Oct 20, 2022 04:09:00 AM
    Thank you, Claude for replying to this post. Otherwise, I might have missed it.

    Patents were awarded in the 70s. Sometime later, both GCHQ and NSA revealed they were in asymmetric space in the late 60s. The first large-scale deployment was a U.S. Government project in the 80s. Entrust was the first publicly available in the 90s. Asymmetric crypto enables online commerce. In fact, I suspect pretty much everyone reading these threads is using the technology.

    One other correction. Cryptography is not solely about encryption. Cryptography also provides other services like message integrity and non-repudiation. Blockchain is an excellent example. The units (aka Blocks) are bound together in a chain using cryptography but the payloads are in the clear.

    CSA might want to consider correcting the post to talk about large-scale adoption and being widely known.

    ------------------------------
    Alex Sharpe
    Principal
    Sharpe42
    [email protected]
    ------------------------------



  • 4.  RE: #TechTopicTuesday

    Posted Oct 21, 2022 12:39:00 PM
    I am under the impression this is an excerpt from a history recursion on how cryptography was born and evolved, from ancient times till today,.....hence the term 'relatively new'.

    But you are right, the term should be more precise to today's time since it is a definition and not just a historic mention.

    Thank you Claude and Alex for noticing it. I'll request a correction.

    Kind regards,
    Marina

    ------------------------------
    Marina Bregkou,
    Senior Research Analyst,
    CSA
    ------------------------------



  • 5.  RE: #TechTopicTuesday

    Posted Oct 22, 2022 02:53:00 AM
    Thank you, Marina.

    This is about CSA's reputation.

    The underlying question is what fact-checking does CSA perform before shooting out these posts. Does CSA source a list of reliable sources? The Internet is full of bad information.

    A couple of quick Google's would have raised enough questions for the author to have paused before hitting send.

    Cheers,
    alex.

    ------------------------------
    Alex Sharpe
    Principal
    Sharpe42
    [email protected]
    ------------------------------



  • 6.  RE: #TechTopicTuesday

    Posted Oct 24, 2022 07:56:00 AM
    I understand your point of view Alex.
    Thank you for looking out for CSA!
    :-)

    Warm regards,
    Marina

    ------------------------------
    Marina Bregkou,
    Senior Research Analyst,
    CSA
    ------------------------------