Cryptographic Attacks

Need to Know More?

http://cybercrimes.net/Cryptography/Articles/Hebert.html History of cryptography

www.ietf.org/html.charters/pkix-charter.html IETF PKI Working Group

www.ietf.org/rfc/rfc3280.txt RFC 3280 information on PKI

http://docs.hp.com/en/J4255-90011/ch04.html An overview of IPSec

www.wired.com/news/politics/0,1283,41658,00.html Steganography in real life

http://www.itl.nist.gov/fipspubs/fip186.htm Digital signature algorithm

www2.cddc.vt.edu/www.eff.org/pub/Privacy/Crypto/Crypto_misc/DESCracker/ Cracking DES

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vsent7/html/vxconWhatIsSecurability.asp Hashing and security

www.abanet.org/scitech/ec/isc/dsg-tutorial.html Digital signatures

Категории