Tag

private key

1 views collected around this technical thread.

Cloud Native Technology Community
Cloud Native Technology Community
Aug 24, 2023 · Information Security

Security Risks of Exposing Private Keys in Istio Service Mesh and Mitigation Approaches

The article analyzes how private keys for workloads uploaded via Istio Ingress gateways can be exposed in plaintext, stored in memory, and extracted using tools like OpenSSL and GDB, and discusses mitigation strategies such as Intel SGX‑based protection.

Cloud NativeGDBSecurity
0 likes · 8 min read
Security Risks of Exposing Private Keys in Istio Service Mesh and Mitigation Approaches
IT Services Circle
IT Services Circle
Aug 22, 2023 · Information Security

Understanding Symmetric and Asymmetric Encryption: Public/Private Keys, AES, and RSA

This article explains the basic concepts of encryption, distinguishes between symmetric and asymmetric methods, describes how public and private keys work, and compares common algorithms such as AES and RSA, highlighting their security properties, performance trade‑offs, and typical use cases.

AESRSAasymmetric
0 likes · 8 min read
Understanding Symmetric and Asymmetric Encryption: Public/Private Keys, AES, and RSA