article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Since the 1970s, Public Key Infrastructure (PKI) has offered encryption , authentication, bootstrapping, and digital signatures to secure digital communications. As encryption methods go, AES-128 and RSA-2048 are vulnerable to quantum attacks. Decentralized data storage that removes the need for a honeypot.