Blog

Cryptoucan™ usage: Handling e-mails on Windows

Written by Lída Hrnčířová on 2019-06-13

In today's post we will learn how to encrypt, decrypt and sign e-mails. You can read this article to learn how to do it or you can watch our instructional video that we made for you!

...

Cryptoucan™ usage: Key management on Windows

Written by Lída Hrnčířová on 2019-06-06

In this blog post you'll learn how to manage your keys using Kleopatra Key Manager on Windows. We will show you basic operations such as importing and exporting keys, and certifying them. As usual, this is accompanied by instructional video showing you all the process.

...

Cryptoucan™ usage: Changing PIN codes on Windows

Written by Lída Hrnčířová on 2019-05-30

It's important to set your own PIN codes once you get your Cryptoucan™. In this article you're going to learn how to do it on Windows using Thunderbird. You can also see all the steps of this process in the instructional video at the bottom of this post.

...

Cryptoucan™ usage: Generating keys on Windows

Written by Lída Hrnčířová on 2019-05-23

In this week's article we'll show you how to generate your own set of private on Windows using Thunderbird. You'll also learn what is revocation certificate for and how to get one. We've created another instructional video that will guide you through the whole process, you can find it at the end of this post as usual.

...

Teaching Cryptography: Rubik's Cube Diffusion

Written by Dominik Joe Pantůček on 2019-05-16

Although we are dealing mostly with asymmetric encryption here at Trustica, truth is that in the end you need to encrypt stuff using some symmetric algorithm. Just exchanging the symmetric keys is not enough - the symmetric cipher must be built from strong cryptographic primitives creating both confusion and diffusion. Read on to find out what one of my Cryptography class students proposed.

...