background preloader

Encryption

http://enigmaco.de/enigma/enigma.swf

Related:  _Crypto ToolsCryptographyRandom RamblingsPrivacyA TINY BIT about Cryptography

An Overview of Cryptography. 1. INTRODUCTION Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords.

Email Security using Public Key Cryptography Introduction Anyone using Email that is concerned about the security of the data being transferred should use Public Key Encryption. There are several open source software tools like GnuPG and WinPt to accomplish these tasks. The primary benefit of public key cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. The need for sender and receiver to share secret keys via some secure channel is eliminated; all communications involve only public keys, and no private key is ever transmitted or shared. This Tip describes the installation and use of GnuPG and WinPt

How to Create a Personal Information Encryption Scheme to Easily Hide Your Data in Plain Sight I think the article is saying you could use LastPass to generate your LastPass password and the article's encryption scheme to keep the password in plain sight. Then you would not have to remember it. For example if your LastPass encryption key password was something like /%/K\G,_sO¦R¥ÅÀbݾöà~¼ÐÂ4×òO? How To Permanently Delete Your Account on Popular Websites - Smashing Magazine Advertisement We all have an increasing number of sites and online services we’re members of, and sometimes it all gets a little overwhelming. At times, we just need to delete our memberships to some sites, either in an effort to simplify our lives or just because we’ve grown tired of a particular site or service.

Hacking Techniques in Wireless Networks Prabhaker Mateti Department of Computer Science and EngineeringWright State UniversityDayton, Ohio 45435-0001 This article is scheduled to appear in “The Handbook of Information Security”, Hossein Bidgoli (Editor-in-Chief), John Wiley & Sons, Inc., 2005. Future of Cryptography Cryptography has been around since the times of the Roman Empire and has been protecting secret information through the ages. From simple mono alphabetic substitution cipher to some of the most advanced cipher like the Advanced Encryption Algorithm (AES), cryptography has been the primary means of preserving confidentiality, integrity, non-repudiation and authenticity of data. Most of the algorithms of the old ancient times have been broken and the hashing and encryption algorithms of modern times are proving to be a little more insecure as each day passes by. According to various reports hashing algorithms MD5 and SHA-1 have either been cracked or have started showing weakness and it has been proved by various researchers that the these algorithms might not be capable of providing the security that is desired of them. This may turn out to be far easier as processing power of computers double every two years based on Moore’s law.

NSA surveillance: how to stay secure Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden. I wasn't part of today's story – it was in process well before I showed up – but everything I read confirms what the Guardian is reporting.

The World Factbook The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA). We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us. Contact Information Submit questions or comments online By postal mail: Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505

Related:  Logic-Crypto-EncrypWeb Applications @mathematicswebtoolDesigncryptographySWFsCyphers/Encriptioneducation