Blog

Cryptoucan™ development: Design of the device shell

Written by Dominik Joe Pantůček on 2018-06-28

Last week, we have shown you the internal electronic circuitry board and the decisions why we choose to create Cryptoucan™ in the first place. Today we are going to show you our thoughts when designing the device exterior.

...

Cryptoucan™ development: a look under the hood

Written by Dominik Joe Pantůček on 2018-06-21

For those who have been wondering what is this Cryptoucan™ all about, wonder no more. We are ready for medium-scale batch production and you will be able to get your own Cryptoucan™ soon. Read on to find out how we designed the integrated circuitry.

...

Toucan email communication

Written by Dominik Joe Pantůček on 2018-06-14

As we have shown during the last few weeks, there are certain confidentiality, integrity and authenticity problems with email communication. We have already shown, that there is some decent cryptography available today that can improve the security of email communication. The only unsolved problem left is how to secure your cryptographic keys when you cannot trust your own computer. Good thing is, you can secure your digital identity even in case your personal computer gets compromised. Read on to learn what we have designed.

...

Elliptic Curve Digital Signature Algorithm

Written by Dominik Joe Pantůček on 2018-06-07

After slightly going astray from the elliptically curved path on our favorite doughnuts, we return from the realm of electronic mail to much more interesting world of mathematics. Today, our effort to explain elliptic curves in simple Weierstrass form and their usage should reach its second culmination. With Diffie-Hellman key exchange explained, the only part that is missing is some digital signature scheme. So please read on to find the beauty of the Elliptic Curve Digital Signature Algorithm beast.

...

Secure email communication

Written by Dominik Joe Pantůček on 2018-05-31

Last week we have discussed something rather boring - casual email communication and the security implications (or more like the lack of security) of using it. We have just re-phrased the well-known fact that casual email communication is far from secure with respect to confidentiality, integrity and authenticity. Today we are about to present a widely used class of solutions that make Eve's life harder, but I am afraid that today is not the day I can present you with ultimate solution to email communication security. But as you probably know, security is a gradual process rather than a product - a silver bullet - that solves all your problems. Read on for our gradual approach.

...