Shedding Light on Quantum Cryptography

Contributed by Curby Simerson

In a networked environment, hosts exchange data at, sometimes, near the speed of light. Even with this speed, an interceptor with minimum effort can easily find himself in the possession of someone else’s information. To that end, users must insure that it is protected by all means. In this document, the technique of cryptography is explored and discussed at a low level to include algorithmic methods and various versions. More specifically, quantum cryptography will be discussed at first from its inception, its categories and families of protocols, and then disclosing the latest findings and information on this innovative technology.

This document is in PDF format. To view it click here.


FastFlex (efflex)

Contributed by Ashish Sharma


An Introduction to Block Cipher Algorithms and Their Applications in Communication Security

Contributed by Anonymous

“The price of freedom is eternal vigilance.” [3] Thomas Jefferson said that in the early 1800’s and it still applies today as much as it applied back then. The rapidly growing need for an “unbreakable” or end-all of all encryption algorithms has been sought after since 1900 BC when the art of Cryptography was first developed. So far, that search has been in vain. There has yet to be an algorithm that is considered unbreakable. However, an algorithm is considered to be secure as long as there has not been found vulnerability through cryptanalysis.

This document is in PDF format. To view it click here.


The Easiest Way to get Around SSL 2

Contributed by Roberto Larcher

This paper explains how it is often possible, with the simple substitution of a string, to get around a "secure" implementation based on an incorrect use of SSL. Please note that this document does not contain any information about weaknesses of the SSL protocol; it simply shows the easiest way to get around the correct functioning of the SSL protocol.

This document is in PDF format. To view it click here.


Flaws and Solutions: Disk Encryption

Contributed by Rob Hornbuckle

Providers of encryption software do not protect against side channel attacks, leaving organizations vulnerable to exploitation. For those companies who have a business justification to employ methods to virtually eliminate the weaknesses within encryption, several options are available. Of note, are methods used by Trevisor, Cryptkeeper, and TPM. Also note that to completely remove the vulnerabilities inherent with Cryptkeeper, it needs to be developed further using concepts from Trevisor. These solutions in their current form are cost prohibitive from an implementation standpoint for most companies.

This document is in PDF format. To view it click here.


Subscribe to RSS - Cryptography