Document DRM: Replacing Encryption as the Standard for Document Protection

Contributed by Dr Stephen Hitchen

Corporate intellectual property and other sensitive information is generally created and maintained in the form of electronic documents. Encryption is routinely used to protect this information against unauthorised access during storage and transfer (e.g. by email). While encrypted, the protected information, or content, is essentially immune to unauthorised access. It may seem, therefore, that the application of modern encryption software provides perfectly adequate protection of such information. However, such a view is superficial – in essence it focuses on only one aspect of securing sensitive information.

This document is in PDF format. To view it click here.


Defeating Encryption: Security is More than Just Good Crypto

Contributed by John C. A. Bambenek

Encryption is good. It helps make things more secure. However, the idea that strong cryptography is good security by itself is simply wrong. Encrypted messages eventually have to be decrypted so they are useful to the sender or receiver. If those end-points are not secured, then getting the plain-text messages is trivial. This is a demonstration of a crude process of accomplishing that.

This document is in PDF format. To view it click here.


Shedding Light on Quantum Cryptography

Contributed by Curby Simerson

In a networked environment, hosts exchange data at, sometimes, near the speed of light. Even with this speed, an interceptor with minimum effort can easily find himself in the possession of someone else’s information. To that end, users must insure that it is protected by all means. In this document, the technique of cryptography is explored and discussed at a low level to include algorithmic methods and various versions. More specifically, quantum cryptography will be discussed at first from its inception, its categories and families of protocols, and then disclosing the latest findings and information on this innovative technology.

This document is in PDF format. To view it click here.


FastFlex (efflex)

Contributed by Ashish Sharma


An Introduction to Block Cipher Algorithms and Their Applications in Communication Security

Contributed by Anonymous

“The price of freedom is eternal vigilance.” [3] Thomas Jefferson said that in the early 1800’s and it still applies today as much as it applied back then. The rapidly growing need for an “unbreakable” or end-all of all encryption algorithms has been sought after since 1900 BC when the art of Cryptography was first developed. So far, that search has been in vain. There has yet to be an algorithm that is considered unbreakable. However, an algorithm is considered to be secure as long as there has not been found vulnerability through cryptanalysis.

This document is in PDF format. To view it click here.


Subscribe to RSS - Cryptography