Cryptographic Attacks
Need to Know More?
http://cybercrimes.net/Cryptography/Articles/Hebert.html History of cryptography
www.ietf.org/html.charters/pkix-charter.html IETF PKI Working Group
www.ietf.org/rfc/rfc3280.txt RFC 3280 information on PKI
http://docs.hp.com/en/J4255-90011/ch04.html An overview of IPSec
www.wired.com/news/politics/0,1283,41658,00.html Steganography in real life
http://www.itl.nist.gov/fipspubs/fip186.htm Digital signature algorithm
www2.cddc.vt.edu/www.eff.org/pub/Privacy/Crypto/Crypto_misc/DESCracker/ Cracking DES
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vsent7/html/vxconWhatIsSecurability.asp Hashing and security
www.abanet.org/scitech/ec/isc/dsg-tutorial.html Digital signatures