A Review of Selected Cryptographic Libraries

By Adrian Stolarski

Cryptography is the science that deals with the problems of concealing information by encrypting it, and contains the set of methods for achieving such secrecy. With cryptography, we can transform a normal, plain text, or other type of message in a way that it becomes unintelligible to unauthorized recipients. A competent recipient upon receipt can convert it back into readable form. Until recently, the main consumers of cryptographic solutions were governmental, diplomatic, and military organizations. The development of digital information flow has since caused the areas of application of cryptography to significantly increase. Today cryptographic techniques are used to authenticate documents and persons, as well as the standard exchange of information. Cryptography is also used in banking and mobile phone industries. Increasingly popular are Internet shopping and online banking accounts.

» Read more

A Review of Asymmetric Cryptography

By Ravi Das

Our last article further examined and finished off the topic of Symmetric Cryptography. Specifically, the following topics were examined: The Caesar Methodology The Types of Cryptographic Attacks Polyalphabetic Encryption Block Ciphers Initialization Vectors Cipher Block Chaining In this article, we now start to examine another Cryptographic Infrastructure, known as “Asymmetric Cryptography.” This is much more complex than that of a Symmetric Cryptographic Infrastructure because it is not just one that is being used, it is two sets of keys which are now being utilized. These are specifically known as the Private Key and the Public Key.

» Read more

CISSP Domain – Cryptography and Security

By Kenneth Magee

There are books upon books about cryptography and this article will not attempt to regurgitate all of the historical background about the subject. However, there are some specific definitions and concepts that you need to understand in order to successfully navigate the CISSP exam and, for that matter, to be successful in your job. First let’s take a look at some definitions: Plaintext — That’s what you’re reading now, plain text. Ciphertext — That’s encrypted text, plain and simple. Encryption — That’s taking a plain text message and converting it to ciphertext. Decryption — That’s taking an encrypted text, or ciphertext, and converting it back to plaintext. Cryptology — Is the science of securing data. Cryptography — Is the process of converting plaintext to ciphertext a.k.a. encryption.

» Read more

Shedding Light on Quantum Cryptography

By Curby Simerson

In a networked environment, hosts exchange data at, sometimes, near the speed of light. Even with this speed, an interceptor with minimum effort can easily find himself in the possession of someone else’s information. To that end, users must insure that it is protected by all means. In this document, the technique of cryptography is explored and discussed at a low level to include algorithmic methods and various versions. More specifically, quantum cryptography will be discussed at first from its inception, its categories and families of protocols, and then disclosing the latest findings and information on this innovative technology.

» Read more

The Mathematical Algorithms of Asymmetric Cryptography and an Introduction to Public Key Infrastructure

By Ravi Das

Our last article provided an overview of what Asymmetric Cryptography Infrastructure looks like. It is far different than that of a Symmetric Cryptography Infrastructure, in that two sets of keys are being used; as opposed to just one set. In this regard, it is the Public Key/Private Key combination which is utilized. Thus it affords it a much higher level security than that of a Symmetric Cryptography Infrastructure. Also, an overview of the technical details of the Public Key/Private Key combinations was provided, as well as some of the disadvantages of utilizing an Asymmetry Cryptography Infrastructure. The biggest disadvantage is that it can be much slower to use. The primary reason for this are the number of Public Key/Private Key combinations which can be generated, and the sheer number of sending and receiving parties which can use them

» Read more

Methods of Cryptoanalytics Attacks – Part 5 – InfoSec Resources

By Dalasta Darren

Modules in this short course: Application & Use of Cryptography Cryptographic Life Cycle and Encryption Concepts Key Management Processes Digital Signatures and Non-Repudiation Methods of Cryptoanalytics Attacks Using Cryptography to Maintain Network Security Using Cryptography to Maintain Application Security Public Key Infrastructure Certificate Related Issues Information Hiding Alternatives

» Read more

Digital Signatures and Non-Repudiation – Part 4 – InfoSec Resources

By Dalasta Darren

Modules in this short course: Application & Use of Cryptography Cryptographic Life Cycle and Encryption Concepts Key Management Processes Digital Signatures and Non-Repudiation Methods of Cryptoanalytics Attacks Using Cryptography to Maintain Network Security Using Cryptography to Maintain Application Security Public Key Infrastructure Certificate Related Issues Information Hiding Alternatives

» Read more

Malicious cryptography, part two

By Frederic Raynal

Now in part two, a continued discussion of armored viruses (using polymorphism and metamorphism) will be followed by the concept of a Bradley worm – a worm that uses cryptography so that it cannot be analyzed. The reader will then look at Skype (now owned by eBay) as an example of an application with embedded cryptography and a closed protocol that can be manipulated by an attacker for malicious purposes, making a virus using this approach very difficult for administrators and anti-virus companies to detect.

» Read more

Cryptography Fundamentals – Part 1

By LM Security

In this mini-course, we will learn about various aspects of cryptography. We’ll start with cryptography objectives, the need for it, various types of cryptography, PKI, and we’ll look at some practical usage in our daily digital communication. In this mini-course, I will explain every detail with an example which end users can perform on their machines.Today, digital communication has become far more important than what it was a decade ago. We use internet banking, social networking sites, online shopping, and online business activities. Everything is online these days, but the internet is not the most secure means to

» Read more

1 3 4 5 6 7