background preloader

Security

Facebook Twitter

Qualys SSL Labs - Projects / SSL Server Test. Metasploit Unleashed. SSL Comparison and Reviews for Finding the Best SSL Certificate. Digital Attack Map. Public Keys and Private Keys - How they work with Encryption | Comodo. The Public and Private key pair comprise of two uniquely related cryptographic keys (basically long random numbers). Below is an example of a Public Key: The Public Key is what its name suggests - Public. It is made available to everyone via a publicly accessible repository or directory. On the other hand, the Private Key must remain confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa. For example, if Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice's Public Key.

As only Alice has access to her Private Key, it is possible that only Alice can decrypt the encrypted data. Public Key Cryptography can therefore achieve Confidentiality. How PGP works. How PGP works The following text is taken from chapter 1 of the document Introduction to Cryptography in the PGP 6.5.1 documentation. Copyright © 1990-1999 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. Converted from PDF to HTML at and then manually edited by hand. The Basics of Cryptography When Julius Caesar sent messages to his generals, he didn't trust his messengers. And so we begin. Encryption and decryption Data that can be read and understood without any special measures is called plaintext or cleartext. Figure 1-1.

What is cryptography? Cryptography is the science of using mathematics to encrypt and decrypt data. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Cryptology embraces both cryptography and cryptanalysis. Strong cryptography --Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. How does cryptography work? Keys. Prime Number Hide-and-Seek: How the RSA Cipher Works. Preface: What is This?

The RSA cipher is a fascinating example of how some of the most abstract mathematical subjects find applications in the real world. Few are the mathematicians who study creatures like the prime numbers with the hope or even desire for their discoveries to be useful outside of their own domain. But every now and then that is exactly what happens. This text explains the mathematics behind RSA -- how and why it works. The intended audience is just about anyone who is interested in the topic and who can remember a few basic facts from algebra: what a variable is, the difference between a prime number and a composite number, and the like.

The most important mathematical facts necessary for understanding RSA's foundations are reviewed near the beginning. In one or two places, I have specifically targeted an explanation to what I consider to be the average computer programmer, leveraging analogous concepts in programming and general mathematics. cannot be inverted. Okay. File:Netfilter-packet-flow.svg. Cancel Edit Delete Preview revert Text of the note (may include Wiki markup) Could not save your note (edit conflict or other problem). Please copy the text in the edit box below and insert it manually by editing this page. Upon submitting the note will be published multi-licensed under the terms of the CC-BY-SA-3.0 license and of the GFDL, versions 1.2, 1.3, or any later version. See our terms of use for more details. Add a note Draw a rectangle onto the image above (press the left mouse button, then drag and release). Save To modify annotations, your browser needs to have the XMLHttpRequest object.

[[MediaWiki talk:Gadget-ImageAnnotator.js|Adding image note]]$1 [[MediaWiki talk:Gadget-ImageAnnotator.js|Changing image note]]$1 [[MediaWiki talk:Gadget-ImageAnnotator.js|Removing image note]]$1. Iptables Tutorial 1.2.2. I would like to dedicate this document to my wonderful sister, niece and brother-in-law for giving me inspiration and feedback. They are a source of joy and a ray of light when I have need of it. Thank you! A special word should also be extended to Ninel for always encouraging my writing and for taking care of me when I needed it the most. Thank you! Second of all, I would like to dedicate this work to all of the incredibly hard working Linux developers and maintainers. Iptables is an extremely knowledge intensive tool. This chapter aims at explaining the pure "must understands" of TCP/IP before you can go on and work with iptables.

Iptables is also able to work on higher layers, such as the Application layer. TCP/IP Layers TCP/IP is, as already stated, multi-layered. The biggest reason is that the whole architecture is very extensible. There are two basic architectures to follow when talking about layers. Application layer Transport layer Internet layer Network Access layer V.