What Is a CSR?

A certificate signing request (CSR) is an encoded message that contains a public key and other relevant information such as your common name, locality and SAN entries (if applicable). Once all of the desired information has been entered during the CSR generation process, the request is digitally » Continue Reading.

What is a “man in the middle” attack?

In a man in the middle (or MITM) attack, communication between two endpoints is compromised by a third party – the ‘man in the middle’. In a passive MITM attack attackers ‘tap’ the communication, capturing information in transit without changing it. If attackers attempt to to modify or tamper with the » Continue Reading.

What Is A Cryptographic Hash Function?

A cryptographic hash function converts arbitrarily long input data into a predetermined fixed-length output value. Hash functions generally include padding as well as termination schemes that work in union with the function itself to provide greater security to the output value. The most commonly used cryptographic » Continue Reading.

What Is SHA-1?

SHA-1 is a cryptographic hash function that can convert an arbitrarily long string of data into a digest with a fixed size of 160 bits. This digest is commonly displayed as a 40 character hexadecimal number. The SHA-1 algorithm is considered insecure, and is being deprecated » Continue Reading.

What Is SHA-2?

SHA-2 refers to a family of cryptographic hash functions that can convert arbitrarily long strings of data into digests of a fixed size. This digest is commonly displayed as a fixed value hexadecimal number. (SHA-256, for instance, returns a 64 character code.) SHA-2 has supplanted SHA-1 in security protocols like SSL/TLS. » Continue Reading.