PGP, PGP/MIME, OpenPGP,S/MIME 

PGP (Pretty Good Privacy) encryption has been around for some time. (Some time = A long time on a computer scale, but a very short time on a history of cryptography scale.) 

Rate this Book: 
The Chinese Remainder Theorem 

Solving Two Congruences, A More General Theorem, Solving Lots of Congruences
Explicit Formulas 

Rate this Book: 
Web Security 

Protect web content from those who don’t have a “need to know”
Require users to authenticate using a userid/password before they are allowed access to certain URLs


Rate this Book: 
System Security 

Like other database systems, the Teradata provides solutions for system security. Security is the protection of data against unauthorized access. 

Rate this Book: 
Simplified DES 

Developed 1996 as a teaching tool Santa Clara University\
Prof. Edward Schaefer Takes an 8bit block plaintext, a 10 –bit key and produces an 8bit block of ciphertext


Rate this Book: 
Network Security 

The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.


Rate this Book: 
RSA Algorithm 

RSA Algorithm topics is discused in this chapter 

Rate this Book: 
Authentication Applications 

Introduction to KERBEROS,How Kerberos works?,Comparison between version 4 and 5
Certificates,X.509 Directory Authentication Service,Conclusion 

Rate this Book: 
Stream Ciphers 

Stream ciphers are a very important class of encryption algorithms. These notes explain what stream ciphers are, explain common subclasses of stream ciphers and discuss the attack models relevant to stream ciphers. 

Rate this Book: 
Digital Signature,Digital Certificate 

Cryptography Secretkey algorithms,Publickey algorithms,MessageDigest algorithms
Digital Signature,Digital Certificate,Public Key Infrastructure (PKI),Secure Electronic Transaction (SET)
Summary 

Rate this Book: 
MD5 & Hash Encryption 

Purpose of MD5 and Hash Encryptions Examples,MD5 Algorithm,Explanation of Possible Security Risks
Practical Applications Through Code,Possible Future Security Risks


Rate this Book: 
Malicious Software 

Malicious software is one of the concerns of the contemporary computing environment. Malcontents, pranksters, vandals, and adversaries
all have the potential ability to disrupt the conduct of our computing business.


Rate this Book: 
LFSR sequences 

Symmetric encryption algorithms are divided into two main categories,
block ciphers and stream ciphers. 

Rate this Book: 
The Legendre and Jacobi Symbols 

The Legendre and Jacobi Symbols and formula are discused in this topic 

Rate this Book: 
IP Security 

Provide Professional training,Support local business
Help our customers with their service quality 

Rate this Book: 
Models of Information Security Analysis 

Definitions,Analysis framework,Cautionary factors,Sample analysis


Rate this Book: 
Hash functions 

In a previous job, I was asked to look at hashing functions and got into a dispute with my boss about how such functions should be designed. 

Rate this Book: 
Firewalls 

A choke point of control and monitoring,Interconnects networks with differing trust


Rate this Book: 
Fermat and Euler’s Theorems 

Prime Numbers,Prime Factorization,Relatively Prime Numbers 

Rate this Book: 
ElGamal PublicKey Cryptosystem 

The Order of an Element. Primitive Roots,ElGamal PublicKey Cryptosystem 

Rate this Book: 
Electronic Mail Security 

email is one of the most widely used and regarded network services
currently message contents are not secure,may be inspected either in transit,or by suitably privileged users on destination system


Rate this Book: 
Discrete logarithms 

Given a primitive element g of a finite field GF(q), the discrete logarithm of a nonzero element
u Î GF(q) is that integer k, 1 £ k £ q  1, for which u = gk. 

Rate this Book: 
Hellman key exchange 

The Di±e{Hellman key exchange algorithm solves the following dilemma.Alice and Bob want to share a secret key for use in a symmetric cipher, but their only means of communication is insecure. 

Rate this Book: 
Differential cryptanalysis 

Differential cryptanalysis, published in 1990 by Biham and Shamir [5, 6], was the first notable
cryptanalysis technique to be discovered outside the world’s intelligence agencies. 

Rate this Book: 
DES, TripleDES, and AES 

Symmetric Cryptography,DES: Data Encryption Standard,DESiderata 

Rate this Book: 
Cryptography Types of ciphers 

Classical substitution ciphers,Transposition (permutation) ciphers,Polyalphabetic Ciphers 

Rate this Book: 
Introduction to Congruences 

The study of congruences is fundamental in Number Theory, and its essential spirit can be captured very quickly by a simple, but important computational 

Rate this Book: 
Classical (secretkey) cryptosystems 

In this chapter we deal with some of the very old or quite old cryptosystems that were primarily used in the precomputer era 

Rate this Book: 
BirthdayAttack 

Sometimes what we also need is collision resistance it is hard to find two random
messages M and M1 such that H(M)=H(M1), This is called birthday attack and is based on a birthday paradox 

Rate this Book: 
Basic Number Theory 

Divisibility and primes Unless mentioned otherwise throughout this lecture
all numbers are nonnegative integers. We say that a divides b,
denoted ab if there’s a k such that ka = b. We say that p is prime if for
a > 0, ap only for a = 1 and a = p 

Rate this Book: 