PGP, PGP/MIME, OpenPGP,S/MIME |
|
PGP (Pretty Good Privacy) encryption has been around for some time. (Some time = A long time on a computer scale, but a very short time on a history of cryptography scale.) |
|
Rate this Book: |
The Chinese Remainder Theorem |
|
Solving Two Congruences, A More General Theorem, Solving Lots of Congruences
Explicit Formulas |
|
Rate this Book: |
Web Security |
|
Protect web content from those who don’t have a “need to know”
Require users to authenticate using a userid/password before they are allowed access to certain URLs
|
|
Rate this Book: |
System Security |
|
Like other database systems, the Teradata provides solutions for system security. Security is the protection of data against unauthorized access. |
|
Rate this Book: |
Simplified DES |
|
Developed 1996 as a teaching tool Santa Clara University\
Prof. Edward Schaefer Takes an 8-bit block plaintext, a 10 –bit key and produces an 8-bit block of ciphertext
|
|
Rate this Book: |
Network Security |
|
The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.
|
|
Rate this Book: |
RSA Algorithm |
|
RSA Algorithm topics is discused in this chapter |
|
Rate this Book: |
Authentication Applications |
|
Introduction to KERBEROS,How Kerberos works?,Comparison between version 4 and 5
Certificates,X.509 Directory Authentication Service,Conclusion |
|
Rate this Book: |
Stream Ciphers |
|
Stream ciphers are a very important class of encryption algorithms. These notes explain what stream ciphers are, explain common subclasses of stream ciphers and discuss the attack models relevant to stream ciphers. |
|
Rate this Book: |
Digital Signature,Digital Certificate |
|
Cryptography Secret-key algorithms,Public-key algorithms,Message-Digest algorithms
Digital Signature,Digital Certificate,Public Key Infrastructure (PKI),Secure Electronic Transaction (SET)
Summary |
|
Rate this Book: |
MD5 & Hash Encryption |
|
Purpose of MD5 and Hash Encryptions Examples,MD5 Algorithm,Explanation of Possible Security Risks
Practical Applications Through Code,Possible Future Security Risks
|
|
Rate this Book: |
Malicious Software |
|
Malicious software is one of the concerns of the contemporary computing environment. Malcontents, pranksters, vandals, and adversaries
all have the potential ability to disrupt the conduct of our computing business.
|
|
Rate this Book: |
LFSR sequences |
|
Symmetric encryption algorithms are divided into two main categories,
block ciphers and stream ciphers. |
|
Rate this Book: |
The Legendre and Jacobi Symbols |
|
The Legendre and Jacobi Symbols and formula are discused in this topic |
|
Rate this Book: |
IP Security |
|
Provide Professional training,Support local business
Help our customers with their service quality |
|
Rate this Book: |
Models of Information Security Analysis |
|
Definitions,Analysis framework,Cautionary factors,Sample analysis
|
|
Rate this Book: |
Hash functions |
|
In a previous job, I was asked to look at hashing functions and got into a dispute with my boss about how such functions should be designed. |
|
Rate this Book: |
Firewalls |
|
A choke point of control and monitoring,Interconnects networks with differing trust
|
|
Rate this Book: |
Fermat and Euler’s Theorems |
|
Prime Numbers,Prime Factorization,Relatively Prime Numbers |
|
Rate this Book: |
ElGamal Public-Key Cryptosystem |
|
The Order of an Element. Primitive Roots,ElGamal Public-Key Cryptosystem |
|
Rate this Book: |
Electronic Mail Security |
|
email is one of the most widely used and regarded network services
currently message contents are not secure,may be inspected either in transit,or by suitably privileged users on destination system
|
|
Rate this Book: |
Discrete logarithms |
|
Given a primitive element g of a finite field GF(q), the discrete logarithm of a nonzero element
u Î GF(q) is that integer k, 1 £ k £ q - 1, for which u = gk. |
|
Rate this Book: |
Hellman key exchange |
|
The Di±e{Hellman key exchange algorithm solves the following dilemma.Alice and Bob want to share a secret key for use in a symmetric cipher, but their only means of communication is insecure. |
|
Rate this Book: |
Differential cryptanalysis |
|
Differential cryptanalysis, published in 1990 by Biham and Shamir [5, 6], was the first notable
cryptanalysis technique to be discovered outside the world’s intelligence agencies. |
|
Rate this Book: |
DES, Triple-DES, and AES |
|
Symmetric Cryptography,DES: Data Encryption Standard,DESiderata |
|
Rate this Book: |
Cryptography Types of ciphers |
|
Classical substitution ciphers,Transposition (permutation) ciphers,Polyalphabetic Ciphers |
|
Rate this Book: |
Introduction to Congruences |
|
The study of congruences is fundamental in Number Theory, and its essential spirit can be captured very quickly by a simple, but important computational |
|
Rate this Book: |
Classical (secret-key) cryptosystems |
|
In this chapter we deal with some of the very old or quite old cryptosystems that were primarily used in the pre-computer era |
|
Rate this Book: |
Birthday-Attack |
|
Sometimes what we also need is collision resistance it is hard to find two random
messages M and M1 such that H(M)=H(M1), This is called birthday attack and is based on a birthday paradox |
|
Rate this Book: |
Basic Number Theory |
|
Divisibility and primes Unless mentioned otherwise throughout this lecture
all numbers are non-negative integers. We say that a divides b,
denoted a|b if there’s a k such that ka = b. We say that p is prime if for
a > 0, a|p only for a = 1 and a = p |
|
Rate this Book: |