background preloader

Encryption

Facebook Twitter

The Masked Letter. Written by a frustrated Lt.

The Masked Letter

General Sir Henry Clinton during the Revolutionary War in 1777, this beautifully crafted Masked Letter is a perfect example of early coded correspondence. The letter reads perfectly well on its own, however only when you place a mask over the paper does the true meaning appear. Incredibly clever, and surprisingly successful as both the letter and mask were sent to the recipient (in this case John Burgoyne) along different routes.

Below is the original letter, a picture of the mask itself, and the letter when read using the mask. The Masked Letter is a form of steganography. Recommended reading: The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Transcript Without Mask You will have heard, Dr Sir I doubt not long before this can have reached you that Sir W. With Mask Sir. CryptoDox. The origin of the word cryptology lies in ancient Greek.

CryptoDox

The word cryptology is made up of two components: kryptos, which means hidden and logos which means word. Cryptology is as old as writing itself, and has been used for thousands of years to safeguard military and diplomatic communications. For example, the famous Roman emperor Julius Caesar used a cipher to protect the messages to his troops.

Within the field of cryptology one can see two separate divisions: cryptography and cryptanalysis. The cryptographer seeks methods to ensure the safety and security of conversations while the cryptanalyst tries to undo the former's work by breaking his systems. The main goals of modern cryptography can be seen as: user authentication, data authentication, non-repudiation of origin, and data confidentiality. In today's society, cryptography is one of tools for privacy & trust. Aim of this Website This website aims at developing a free encyclopedia on cryptography and information security. Hide Secret Files in Office 2007 Documents. One-Time Pad Generator. This page, which requires that your browser support JavaScript (see Why JavaScript below), generates one-time pads or password lists in a variety of forms.

One-Time Pad Generator

It is based a high-quality pseudorandom sequence generator, which can be seeded either from the current date and time, or from a seed you provide. Fill in the form below to select the format of the pad and press “Generate” to create the pad in the text box. You can then copy and paste the generated pad into another window to use as you wish.

Each of the labels on the request form is linked to a description of that parameter. Details Each of the fields in the one-time pad request form is described below. Output Number of keys Enter the number of keys you'd like to generate. Line length Lines in the output will be limited to the given length (or contain only one key if the line length is less than required for a single key). Format Key length Each key will contain this number of characters, not counting separators between groups. Group length. Whitepixel breaks 28.6 billion password/sec - Zorinaq. I am glad to announce, firstly, the release of whitepixel, an open source GPU-accelerated password hash auditing software for AMD/ATI graphics cards that qualifies as the world's fastest single-hash MD5 brute forcer; and secondly, that a Linux computer built with four dual-GPU AMD Radeon HD 5970 graphics cards for the purpose of running whitepixel is the first demonstration of eight AMD GPUs concurrently running this type of cryptographic workload on a single system.

Whitepixel breaks 28.6 billion password/sec - Zorinaq

This software and hardware combination achieves a rate of 28.6 billion MD5 password hashes tested per second, consumes 1230 Watt at full load, and costs 2700 USD as of December 2010. The capital and operating costs of such a system are only a small fraction of running the same workload on Amazon EC2 GPU instances, as I will detail in this post. [Update 2010-12-14: whitepixel v2 achieves a higher rate of 33.1 billion password/sec on 4xHD 5970.] Software: whitepixel Overview of whitepixel That said, speed is not everything. Computer Security Division - Computer Security Resource Center. Full disk encryption is too good, says US intelligence agency. Digital Investigation : The growing impact of full disk encryption on digital forensics.