Flaws and Solutions: Disk Encryption

Contributed by Rob Hornbuckle

Providers of encryption software do not protect against side channel attacks, leaving organizations vulnerable to exploitation. For those companies who have a business justification to employ methods to virtually eliminate the weaknesses within encryption, several options are available. Of note, are methods used by Trevisor, Cryptkeeper, and TPM. Also note that to completely remove the vulnerabilities inherent with Cryptkeeper, it needs to be developed further using concepts from Trevisor. These solutions in their current form are cost prohibitive from an implementation standpoint for most companies.

This document is in PDF format. To view it click here.


Advanced Encryption Standard by Example

Contributed by Adam Berent

The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL) encryption algorithm. The purpose of this paper is to give developers with little or no knowledge of cryptography the ability to implement AES.

This document is in PDF format. To view it click here.


Combinational Stream & Block Ciphering Using Double Encryption Algorithms


Contributed by Ashish Anand and restored from the old Infosecwriters archives.

“If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism – and you still can’t open the safe and read the letter – that’s security!”

This document is in PDF format. To view it click here.


Elliptic Curve Cryptography

Contributed by Anoop M.S.

The paper gives an introduction to elliptic curve cryptography (ECC) and how it is used in the implementation of digital signature (ECDSA) and key agreement (ECDH) Algorithms. The paper discusses the implementation of ECC on two finite fields, prime field and binary field. It also gives an overview of ECC implementation on different coordinate systems called the projective coordinate systems. The paper also discusses the basics of prime and binary field arithmetic.

This document is in PDF format. To view it click here.


Public Key Cryptography

Contributed from Anoop MS


Subscribe to RSS - Cryptography