The Importance of Digital Certificates

Contributed by

The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they should not purchase something that doesn’t have a digital certificate and about a hacker group called Suckfly using digital certificates to exploit them for their benefits.

This document is in PDF format. To view it click here.



Contributed by an Anonymous source.

This paper is a good introduction to Bitlocker. Microsoft bitlocker is a full disk encryption tool/software to help protect data that is saved on the hard drive that has Microsoft windows installed on the system.

This document is in PDF format. To view it click here.


Steganography FAQ

Contributed by Aelphaeis Mangarae

Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between the two is that Steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information.

This document is in PDF format. To view it click here.


Cloud Computing and Homomorphic Encryption

Contributed by Vicki Holzknecht

Cloud Computing has recently gained quite a bit of momentum throughout the technology community. The Cloud is intertwined in everyday living via mobility platforms, social networking, email, accessing cloud based applications, the list goes on for miles. Cloud Computing allows for services to be delivered by simply having an Internet connection. When encrypted data is sent to the cloud is it truly secure? How safe is the Cloud? The research within this paper will explain how a form of encryption known as homomorphic can be interlaced into the software for truly encrypting data without it ever being decrypted when stored within the cloud.

This document is in PDF format. To view it click here.


Distinguishing Attack on FastFlex Stream Cipher

Contributed by M. Orumiehchi

Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from FastFlex can be distinguished from a truly random stream with probability 1 and a few output streams.

This document is in PDF format. To view it click here.


Subscribe to RSS - Cryptography