When and Why to use Message Authentication Codes(MACs)

The purpose of a message authentication code, abbreviated “MAC”, is to validate that 1) some data has not been altered and that 2) it was created by the entity that claims to have created it. An HMAC, hash-based message authentication code, is a special type of MAC which uses the hashed combination of a secret key…

Overview of the Evolved Packet Core (EPC)

In 2011, the 3GPP mobile network standards body released the blueprint for an all internet-protocol based network called the Evolved Packet Core(EPC) as part of their work to incorporate LTE into the existing network infrastructure. The goals set forth by 3GPP were to create a low-latency, high data-rate, packet based system that supports multiple access…

(909) 795-0781

The public key infrastructure(PKI) is the foundation for transport layer security(TLS) which is used in hopefully every application that you use; your bank, Facebook, Bitcoin, and even this blog use some elements of the public key infrastructure to secure your communications and prevent hackers from stealing your information, money, and posting fake statuses on your…

(604) 865-9169

Elliptic Curve Cryptography Elliptic Curve Cryptography, abbreviated ECC, is one of the most powerful yet most complicated forms of cryptography in use today. Many security experts call ECC the “second generation” of public key cryptography, while others cast serious doubts due to NSA tampering and the advent of quantum computing. By the end of this…