How PGP Works The Basics of cryptography. When Julius Caesar sent messages to hisgenerals, he didn t trust his messengers. What is cryptography? http://www.pgpi.org/doc/pgpintro/
Extractions: The following text is taken from chapter 1 of the document Introduction to Cryptography http://access.adobe.com/ and then manually edited by hand. When Julius Caesar sent messages to his generals, he didn't trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the "shift by 3" rule could decipher his messages. And so we begin. Data that can be read and understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called ciphertext. You use encryption to ensure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting ciphertext to its original plaintext is called decryption Figure 1-1 illustrates this process.
Bouncycastle.org Provides open source implentations of the Java cryptography Extension 1.2.1, and a lightweight Java cryptography API for the J2ME, and the JDK. Open Source http://www.bouncycastle.org/
Extractions: home mailing lists latest releases documentation ... legal and licencing Welcome to the home of the Legion of the Bouncy Castle . A fun place to stay, if you've got some time to kill. Here at the Bouncy Castle, we believe in encryption. That's something that's near and dear to our hearts. We believe so strongly in encryption, that we've gone to the effort to provide some for everybody. The Bouncy Castle Crypto APIs consist of the following: The lightweight API works with everything from the J2ME to the JDK 1.4 Software produced by this site is covered by the following license. Looking for something not listed? Have a look at the projects listed on our resources page.
CyberLaw (tm) -- CRYPTOGRAPHY & SPEECH cryptography SPEECH. Dr. Daniel Bernstein has some ideas about cryptography,the art and science of keeping messages secure, that he wants to share. http://www.cyberlaw.com/cylw1095.html
Extractions: by Jonathan Rosenoer "Without cryptography, what people send via computers is the electronic equivalent of a postcards, open to view by many people while the message is in transit. With cryptography, people can put both messages and money into electronic 'envelopes,' secure in the knowledge that what they send is not accessible to anyone except the intended recipient. ... Continued development of cryptography promises to make it possible for the worldwide computer Internet to offer private, secure and protected communication among billions of people worldwide." While a Ph.D. candidate in Mathematics at the University of California at Berkeley, Daniel Bernstein worked in the field of cryptography and developed an "encryption algorithm or recipe which he calls 'Snuffle.'" He described Snuffle in English and in mathematical equations, as well as in the "C" computer programming language (Snuffle.c and Unsnuffle.c). Bernstein wants to publish his cryptographic ideas and research results "as part of the normal process of academic, scientific and political exchange of ideas and information," and, in particular, in "text journals as well as in an online discussion group about the science of cryptography, called sci.crypt. According to Bernstein, "[a]ware of the [Government's] civil and criminal restrictions on cryptography export, [he] asked the Office of Defense Trade Controls ("OTDC"), an arm of the State Department, to find out whether he could publish his ideas." He told OTDC that he wanted to export the document "The Snuffle Encryption System," and the Snuffle.c and Unsnuffle.c source files.
Kaladix Linux - The Secure Linux Distribution Server distribution, includes set of security hardening patches, mostly for the kernel; RSBAC, cryptography, general security software. Currently unavailable. http://www.kaladix.org/
Extractions: Welcome to kaladix.org, the official site of Kaladix Linux! Unfortunately the project has been discontinued. There will be no future release of Kaladix Linux anytime soon. Meanwhile private development on a Firewall specific appliance based on Linux is done, but exclusively sold to the [Login Lanstation Group] News Information Get Kaladix Errata Documentation About us Links
Cryptography And Steganography cryptography and Steganography. Codegroup. Utility which encodes and allthis. JavaScrypt BrowserBased cryptography. A collection http://www.fourmilab.ch/nav/topics/crypto.html
Extractions: Utility which encodes and decodes binary files into five-letter code groups just like secret agents use. Handy for sending small binary messages by telephone, radio, or telegraph. Quantum mechanics teaches us that, at the deepest level, uncertainty rules the universe: there are things we cannot predict, even in principle. HotBits harnesses this fundamental uncertainty of nature to generate truly random bits, unlike the pseudorandom sequences created by an algorithm on a computer. Along the way, you'll find a discussion of the hardware and software used to generate the random bytes comprehensive enough to build your own, and peek under the hood of quantum mechanics to see why the data are genuinely random, and some of the implications of all this. A collection of Web pages and programs in the JavaScript language perform military-grade encryption (256 bit secret key AES entirely within your Web browser you needn't download nor install any software, and nothing is sent to any Web site when you encrypt or decrypt a message. You can download the page source and JavaScript programs to your own computer and use them even when not connected to the Internet. Companion pages provide a text-based steganography facility and key generator suitable for preparing one-time key lists. Please visit the JavaScrypt Home Page for details, or the
Security Related Links You are interested in Security and cryptography. cryptography. Intro SpecificTopics Politics Software Hardware Introductions to cryptography. http://www.semper.org/sirene/outsideworld/security.html
Extractions: Security and Cryptography Remark: Other security related references are on the "Organizations" "Privacy" "Standards" and "Conferences" pages. HTTP SHEN SHTTP MOSS ... IETF Working Groups HTTP HyperText Transfer Protocol IETF HTTP Working Group Protocol specification of Suggestions for Secure HyperText Transfer Protocols: SHEN (by CERN Access Authorization in WWW Shen: A Security Scheme for the World Wide Web (gives also pointers to basic systems and related security standards like PEM, GSS) SHTTP (by EIT/RSA/NCSA SSL/TLS see below [PROPOSED] HTTP Working Group INTERNET-DRAFT Digest Access Authentication (by SpyGlass Simple Digest Security Scheme (by CERN PGP/PEM (by NCSA Comments and Collections of Pointers Spyglass White Paper - 12/6/94 (DRAFT) "Electronic Commerce Standards for the WWW" Rutgers University: WWW Security References and World Wide Web Security W3C's Security Resource Page MOSS MIME Object Security Services PEM Privacy Enhanced Mail Specification RFC 1421: Message Encryption and Authentication Procedures RFC 1422: Certificate-Based Key Management RFC 1423: Algorithms, Modes, and Identifiers
Bondi Richard Bondi. Subtitled A Programmer's Guide to the Microsoft CryptoAPI which describes what the book is about. http://www.cryptovb.com/books/bondi/bondi.html
Extractions: Bruce Schneier, author of Applied Cryptography and CTO of Counterpane Internet Security, Inc See authors description below. Publisher Author Richard Bondi Pub. Date September 2000 ISBN Format Purchase I wrote this book in order to make strong cryptography available to as many Visual Basic programmers as possible. The best way to do that was to write some very intuitive VB COM wrappers, and release them to the world with an Open Source license. That kind of license both permits and encourages programmers to make the source code available to other programmers, and to modify it for their own use, free of charge. (You can read more about Open Source licenses here Unfortunately, cryptography is complicated. That means that there can be no such thing as simple COM cryptography objects per se. In order to program with cryptography, a programmer must first have a good grasp of the basics of modern cryptography. Therefore my approach was to write a book that does that, and then write my COM objects so that they would be intuitive and simple for someone who understands cryptography. So my book has three main goals: Explain modern cryptography to Visual Basic programmers (Chapter 1).
Honors Seminar In Cryptography Honors Seminar in cryptography. Spring Semester, 2002. University of Illinoisat Chicago. Seminar Outline. Part I. cryptography before 1960. http://raphael.math.uic.edu/~jeremy/crypt/crypt.html
Extractions: Honors Seminar in Cryptography The Honors Seminar in Cryptography is a one-hour-a-week course for members of the Honors College at UIC on the basics of Cryptography, the science of secret communication. Once pursued unscientifically by diplomats, spies, and puzzlers, Cryptography has developed into a highly mathematical science. In this seminar, we will discuss the basic elements of this science. In addition, we will review how the Allied efforts to break German and Japanese codes contributed both to better cryptographic techniques and to other developments in computers and mathematics. We will learn about modern techniques of public key cryptography, and and we will discuss the many important implications that Cryptographic science and policy has for civil liberties, commerce, and law enforcement. While not a technical course in mathematical cryptography, participants in the seminar will need to be willing to learn some basic probability and number theory, and to use computers for some projects. They will also be expected to actively participate in the discussions. This Web Page is still under development! Send comments to
Crypto-Log: Internet Guide To Cryptography CryptoLog, the Internet Guide to cryptography, is an annotated collection ofpointers to everything available on the net/web about cryptography (programs http://www.uni-mannheim.de/studorg/gahg/PGP/cryptolog1.html
Extractions: Table of Contents: for Cryptography Archives Bibliographies Periodicals E-Journals ... Calendar (conferences, meetings, workshops) (SFS, Secure Drive, etc.) Key Escrow (ITAR, export issues, etc.) Links to introductions and personal pages on cryptography (SSL, SHTTP, Kerberos, etc.) Newsgroups, FAQs and Mailing Lists Organizations: Academic Commercial Government Policy ... Policy Discussions (see also: Policy Organizations Key Escrow (IETF, ) Software (products, programs and source code;
Alt.security.keydist Resources Instructions for distributing public keys on Usenet. Also features information and links of interest to those interested in cryptography rights. http://www.alt-security-keydist.info/
Extractions: This site is a collection of resources about and relating to alt.security.keydist , a newsgroup used to distribute public encryption keys (such as those used by PGP and GPG ) through the UUCP NNTP netnews system. The FAQ was created in 1997. After a few years of inactivity, it's now being posted to the group every 30 days. The FAQ was last updated 1 January 2004. The alt.security.keydist FAQ is a "news.answers-approved" FAQ , and therefore archived at most major FAQ archives on the Internet, including the rtfm.mit.edu FTP server and FAQS.org Since alt.security.keydist is intended for people who use both Usenet and public key encryption, I've decided to add a quick list of software that helps people use public key encryption on Usenet. A list of other cryptography-related newsgroups is also available.
COmputer Security And Industrial Cryptography COSIC COmputer Security and Industrial cryptography COSIC coorganizes aseries of seminars on Computational Number Theory and cryptography. http://www.esat.kuleuven.ac.be/cosic/
Extractions: General info about COSIC's current and past activities COSIC is headed by Prof. Bart Preneel and Prof. Joos Vandewalle. More about the people at COSIC. COSIC's current research and projects COSIC's publications from 1982 until 2003. COSIC's (Master) thesis proposals and a list of the past Master theses COSIC organizes biweekly seminars on various topics.
Extractions: DI Management Services is a database design and business systems consultant based in Sydney, Australia ...more... This page contains useful free cryptographic software code that David Ireland has written or adapted in Visual Basic and ANSI C. There are also some links to useful cryptography sites . This work is updated frequently, so keep checking. Table of contents below. Our brand new CryptoSys PKI Toolkit for Visual Basic and C/C++ developers has been released on 25 February 2004. The PKI Toolkit features RSA public key encryption, digital signatures, X.509 certificate handling, and cryptographic message syntax (CMS) objects that can be used with S/MIME. The toolkit includes other utilities like message digest computation, secure random numbers, and base64 conversion functions. More details at CryptoSys PKI Toolkit The PKI Toolkit is the perfect companion for our original CryptoSys API product which includes symmetrical encryption functions (AES, Triple DES, Blowfish, DES) and advanced hash functions (SHA-1, SHA-256). More details at
Extractions: Security and privacy have long been important issues forming the basis of numerous democracies around the world. In the digital age, securing personal information and ensuring privacy pose to be issues of paramount concern. At first glance, one might find it gratifying that an online website greets the person by their first name, sends them emails when goods of their taste are added, or recommends goods services based on their demographic profile, previous visits, etc. An astute surfer though will also see the privacy drawbacks in such services. Who else is being provided this information? Is there a way to ensure the security of this information? What happens with the information if the company meets financial diffuculties and has to liquidate its assets? Where does all that "private information" go? Many studies over the last few years have suggested that a majority of consumers are concerned about when, what and how their personal information is being collected, how this information is being used and whether it is being protected. They want to know whether the information is being sold or shared with others, and if so with whom and for what purposes. They also want to have control over their privacy in today's digital age where strides in telecommunicaiton, storage and software technologies have made monitoring a person's activities effortless.
Cryptography's Role In Securing The Information Society cryptography s. Role. In. Securing The. Information. Society. 1 GROWING VULNERABILITYIN THE INFORMATION AGE; 2 cryptography ROLES, MARKET, AND INFRASTRUCTURE; http://www.nap.edu/readingroom/books/crisis/
Bibliography Of "Designs, Codes And Cryptography" Hypertext bibliography containing all papers published in Designs, Codes and cryptography, maintained by David M Jones. http://liinwww.ira.uka.de/bibliography/Misc/HBP/DCC.html
Extractions: Computer Science Bibliographies Up: Bibliographies of the Hypertext Bibliography Project Collection Home Bibliography of "Designs, Codes and Cryptography" About Browse Statistics Number of references: Last update: July 6, 2001 Number of online publications: Supported: no Most recent reference: May 1998 Search the Bibliography Query: Options case insensitive Case Sensitive partial word(s) exact online papers only Results Citation BibTeX Count Only Maximum of matches Help on: [ Syntax Options Improving your query Query examples
Oxford Quantum Computation Group We have moved! The Oxford Quantum Computation and cryptography Group isnow part of the Centre for Quantum Computation. Our new address is http://eve.physics.ox.ac.uk/QChome.html
Financial Cryptography '00 The conference is organized by the International Financial cryptographyAssociation (IFCA). The Financial cryptography conferences http://fc00.ai/
Extractions: 21-24 February 2000, Anguilla, BWI FC00, the fourth international conference on financial data security and digital commerce, will be held 21-24 Febuary 2000 in Anguilla , British West Indies. FC00 aims to bring together persons involved in both the financial and data security fields to foster cooperation and exchange of ideas. The conference is organized by the International Financial Cryptography Association IFCA The Financial Cryptography conferences are intended for anybody interested in secure digital commerce and related technologies. In addition to the core technical presentations, there are discussions of policy, regulatory, legal, and banking issues. The conference has international participation from the business, legal, and scientific communities, and is a valuable forum in which to make new contacts and disseminate information. Special pricing is available for academic and student attendees. The conference will be held at Chandeliers , the conference facility of the InterIsland Hotel, which is on Road Bay, near Sandy Ground Village, in the South Hill section of Anguilla. To receive announcements about the Financial Cryptography conference series in general, send email to fc-request@ifca.ai with the subject "subscribe". To receive information about the FC00 conference in particular, send email to fc00-request@ifca.ai with the subject "subscribe".