-
Hello, I'm evaluating some encrypted `Storage` libraries for inclusion in a project, and I noticed a potential issue in the way secret-local-storage generates keys.
The `keygen` function in https:/…
-
Defect:
Here the quiz consists of questions which are descriptive and which cannot be evaluated.So i created a new assignment option where these descriptive questions are available.
Expected Result:…
-
Currently all transport messages are sent as plain data and as a result are vulnerable to different kinds of attacks (eavesdropping, tampering, or attempts to generate fake events) in case if maliciou…
-
Defect description: at the page of quizzes that is obtained by navigating the path shown in the title, the radio-buttons in the quiz are clumsy and not well organised.expected result : moreover, enhan…
-
**Defect description:**after going to the quiz section, we are given an option to select the answer in mcq's. but there is no submit button and we cannot review the answer. either removing the check b…
-
**Defect description:**after going to the quiz section, we are given an option to select the answer in mcq's. but there is no submit button and we cannot review the answer. either removing the check b…
-
In the excel spreadsheet line 97 and98 is documented that the ONF air interface supports encryption related configurations.
```
| | | +--rw air-interface:encryption-is-on? …
-
The current Cryptography Basics section provides a good overview, but it could benefit from more detailed explanations and practical examples.
Tasks:
- [x] Add more examples of symmetric encryptio…
-
**Provide the location of the issue**
6.4.1.1, FCS_CKM.1 Cryptographic Key Generation (Refinement)
**What is the enhancement request for the cPP? Please describe.**
FCS_CKM.1 only specifies asy…
-
Course Certificates Completed
Cryptography and Information Theory
Symmetric Cryptography
Asymmetric Cryptography and Key Management
Cryptographic Hash and Integrity Protection
Classical…