Cryptography

Wed
19
Aug

Advanced Encryption Standard by Example

Contributed by Adam Berent

The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL) encryption algorithm. The purpose of this paper is to give developers with little or no knowledge of cryptography the ability to implement AES.

This document is in PDF format. To view it click here.

Wed
08
Jul

Combinational Stream & Block Ciphering Using Double Encryption Algorithms

Cryptography

Contributed by Ashish Anand and restored from the old Infosecwriters archives.

“If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism – and you still can’t open the safe and read the letter – that’s security!”

This document is in PDF format. To view it click here.

Mon
22
Jun

Elliptic Curve Cryptography

Contributed by Anoop M.S.

The paper gives an introduction to elliptic curve cryptography (ECC) and how it is used in the implementation of digital signature (ECDSA) and key agreement (ECDH) Algorithms. The paper discusses the implementation of ECC on two finite fields, prime field and binary field. It also gives an overview of ECC implementation on different coordinate systems called the projective coordinate systems. The paper also discusses the basics of prime and binary field arithmetic.

This document is in PDF format. To view it click here.

Sun
17
May

Public Key Cryptography

Contributed from Anoop MS

Pages

Subscribe to RSS - Cryptography