Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden. If the message is intercepted, a third party has everything they need to decrypt and read the message.
The purpose of cryptography is to protect data transmitted in the likely presence of an adversary. A cryptographic transformation of data is a procedure by which plain text data is disguised, or encrypted, resulting in an altered text, called ciphertext, that does not reveal the original input.
Related technical areas:
A hardware security module (HSM) is a physical device that provides extra security for sensitive data. These devices can be plugin cards or be embedded in other hardware, including smart cards, appliances and other external devices. They can be connected to a network server or used as a standalone device offline.
The public key infrastructure (PKI) is the set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and public-keys.
Example titles we recruit:
- "Cryptography Architect"
- "Cryptography Consultant"
- "PKI Engineer"
- "HSM Specialist"
Example successful project:
Excelerate partners with an investment bank based in Frankfurt, Germany. The bank requires a continuous flow of recruitment assistance for their security teams, with a particularly demanding cryptography team. The business requires PKI, HSM and general IT crypto experience from a deployment and architectural perspective to perform long term freelancer contracts.