Asymmetric encryption rules seem to confuse people as to when to use a private or a public key and for what purpose. Given below is a table which gives in lucid form of what key to use, when to use and for what purpose.
In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine from a completely “off” state. The attack relies on the data retention property of DRAM and SRAM to retrieve memory contents which remain readable in the seconds to minutes after power has been removed.
It is quite common these days to hear of sensitive information being lost when laptops are either stolen or lost. Rarely does a month go by without an organisation revealing the loss or theft of a laptop brimming with sensitive data. Full disk encryption, or FDE, is the preferred mechanism to address this threat. Continue reading “Full Disk Encryption-Software based or Hardware based?”