When and Why to use Message Authentication Codes(MACs)

The purpose of a message authentication code, abbreviated “MAC”, is to validate that 1) some data has not been altered and that 2) it was created by the entity that claims to have created it. An HMAC, hash-based message authentication code, is a special type of MAC which uses the hashed combination of a secret key…

(787) 274-4109

Why does the MME get to sit at the center of the EPC network and all of the fun images? Because it does handles nearly all control data and without it LTE could not function at all. Under the hood of the EPC, the MME handles many of the important things that make the entire…

Overview of the Evolved Packet Core (EPC)

In 2011, the 3GPP mobile network standards body released the blueprint for an all internet-protocol based network called the Evolved Packet Core(EPC) as part of their work to incorporate LTE into the existing network infrastructure. The goals set forth by 3GPP were to create a low-latency, high data-rate, packet based system that supports multiple access…

Camaxtli

The public key infrastructure(PKI) is the foundation for transport layer security(TLS) which is used in hopefully every application that you use; your bank, Facebook, Bitcoin, and even this blog use some elements of the public key infrastructure to secure your communications and prevent hackers from stealing your information, money, and posting fake statuses on your…

(859) 838-1283

AES – Symmetric Cryptography If you are building any system which much be in use for the next 5-25 years, there is only one practical solution to prevent a future quantum computer from discovering your private keys and making all of your past and present communications visible: the use of AES symmetric cryptography, otherwise known…

Primer on Elliptic Curve Cryptography(ECC)

Elliptic Curve Cryptography Elliptic Curve Cryptography, abbreviated ECC, is one of the most powerful yet most complicated forms of cryptography in use today. Many security experts call ECC the “second generation” of public key cryptography, while others cast serious doubts due to NSA tampering and the advent of quantum computing. By the end of this…