background preloader

Cryptography

Facebook Twitter

CryptoDox. The origin of the word cryptology lies in ancient Greek. The word cryptology is made up of two components: kryptos, which means hidden and logos which means word. Cryptology is as old as writing itself, and has been used for thousands of years to safeguard military and diplomatic communications. For example, the famous Roman emperor Julius Caesar used a cipher to protect the messages to his troops.

Within the field of cryptology one can see two separate divisions: cryptography and cryptanalysis. The cryptographer seeks methods to ensure the safety and security of conversations while the cryptanalyst tries to undo the former's work by breaking his systems. The main goals of modern cryptography can be seen as: user authentication, data authentication, non-repudiation of origin, and data confidentiality. In today's society, cryptography is one of tools for privacy & trust.

Aim of this Website This website aims at developing a free encyclopedia on cryptography and information security. Cryptology ePrint Archive. How To Migrate to a full encrypted LVM system. Posted by gpall on Mon 28 Jan 2008 at 15:07 The point of this how-to is to describe the way to migrate to a full-encrypted LVM system (rootfs + data) (only the boot partition obviously stays unencrypted), either coming from an LVM system, either from a simple ext3 system. All you need is some kind of external storage.

It should be here noted that since the operations described below are not very trivial, this procedure should only be followed by people somewhat experienced. PART I - Installing neccessary software and saving the current system There are two ways to implement the LVM full encrypted system:a) the debian way (TM), which has the LVM on an encrypted virtual device (cryptsetup)b) the other way, which first makes an LVM on your physical devices, and then encrypts the logical volumes I preferred the debian way of course, although I don't find any specific reason for that. To begin with, install 'cryptsetup'.

This will save all necessary permissions, files, ownerships etc etc. PS. Cryptography and Network Security, Third Edition. Student Resources Cryptography and Network Security, Third Edition Last updated: Useful Web Sites Chapter 1 - Overview COAST : Comprehensive set of links to sites related to cryptography and network security. IETF Security Area : Keep up to date on Internet security standardization efforts The Cryptography FAQ : Lengthy and worthwhile FAQ covering all aspects of cryptography. Tom Dunigan's Security Page : An excellent list of pointers to cryptography and network security web sites. Helgar Lipma's Cryptology Pointers : Another excellent list of pointers to cryptography and network security web sites. IEEE Technical Committee on Security and Privacy : Home of the electronic newsletter Cipher, which provides book reviews, new crypto and security links, and links to reports and papers available online.

Computer Security Resource Center : Maintained by NIST; contains a broad range of information on security threats, technology, and standards. SANS Institute : Similar to Security Focus. TrueCrypt - Free Open-Source On-The-Fly Disk Encryption for Windows XP/2000/2003.