Encrypt and decrypt data using public/private key pairs and derive symmetric keys from ECC key pairs. RSA Encryption (OpenSSL) 1# Generate RSA key pair 2openssl genrsa -out private.pem 4096 3openssl rsa -in private.pem -pubout -out public.pem 4 5# Encrypt file with public key 6openssl rsautl -encrypt -pubin -inkey …
Read MoreHardware security features: TPM, Secure Boot, hardware encryption, and security best practices. TPM (Trusted Platform Module) Check TPM Status (Linux) 1# Check if TPM exists 2ls /dev/tpm* 3 4# TPM version 5cat /sys/class/tpm/tpm0/tpm_version_major 6 7# TPM info 8sudo tpm2_getcap properties-fixed 9 10# Install TPM tools …
Read MoreSymmetric encryption algorithms with mathematical foundations and practical implementations. Mathematical Definition Symmetric encryption uses the same key for encryption and decryption: $$ \begin{aligned} C &= E_K(P) \quad \text{(Encryption)} \ P &= D_K(C) \quad \text{(Decryption)} \end{aligned} $$ Where: $P$: …
Read More