background preloader

CrypTool - Educational Tool for Cryptography and Cryptanalysis

CrypTool - Educational Tool for Cryptography and Cryptanalysis

Related:  security & privacyCryptographyA TINY BIT about Cryptography

Email Security using Public Key Cryptography Introduction Anyone using Email that is concerned about the security of the data being transferred should use Public Key Encryption. There are several open source software tools like GnuPG and WinPt to accomplish these tasks. The primary benefit of public key cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. The need for sender and receiver to share secret keys via some secure channel is eliminated; all communications involve only public keys, and no private key is ever transmitted or shared.

Hacking Techniques in Wireless Networks Prabhaker Mateti Department of Computer Science and EngineeringWright State UniversityDayton, Ohio 45435-0001 This article is scheduled to appear in “The Handbook of Information Security”, Hossein Bidgoli (Editor-in-Chief), John Wiley & Sons, Inc., 2005. 1. Introduction. 2 2.

An Overview of Cryptography 1. INTRODUCTION Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. 'Uncrackable' codes set for step up 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications. A team of British scientists has discovered a way to build communications networks with quantum cryptography at a larger scale than ever before. Quantum cryptography has the potential to transform the way sensitive data is protected. Details appear in Nature journal.

The 10 Tools of Online Oppressors - Reports SAN FRANCISCO In reporting news from the world’s most troubled nations, journalists have made a seismic shift this year in their reliance on the Internet and other digital tools. Blogging, video sharing, text messaging, and live-streaming from cellphones brought images of popular unrest from the central square of Cairo and the main boulevard of Tunis to the rest of the world. In Other Languages • Español • Português • Français • Русский • العربية • Multimedia • Audio Report: Offenders and TacticsIn Print • Download the pdfMore on This Issue • CPJ Internet Channel: Danny O'Brien's blog • Blogging in Egypt: Virtual network, virtual oppression • Burmese exile news site endures hacking, DDoS attacks Yet the technology used to report the news has been matched in many ways by the tools used to suppress information. In two nations we cite, Egypt and Tunisia, the regimes have changed, but their successors have not categorically broken with past repressive practices.

NSA surveillance: how to stay secure Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden. I wasn't part of today's story – it was in process well before I showed up – but everything I read confirms what the Guardian is reporting. At this point, I feel I can provide some advice for keeping secure against such an adversary. The primary way the NSA eavesdrops on internet communications is in the network. That's where their capabilities best scale.

PRISM - Where do we go from here? In light of the shocking revelations regarding the United States surveillance machine (the National Security Agency) and their PRISM initiative - one has to ask how do we move forward? As you can see from my previous blog post, I have personally written to President Barroso of the European Commission asking that the Commission immediately revoke the Safe Harbour status of the United States, ban all US companies from EU markets until such time as the US Government acknowledge and uphold the fundamental and constitutional rights of European citizens and begin a formal investigation into the allegations that the UK Government's signals analysis agency GCHQ used PRISM to circumvent the legal processes in place governing the acquisition and interception of citizens' communications. People have already started to ask me to recommend some alternatives to the popular services we use online, to be honest there aren't very many. For the above reasons, I once again turn my old friends at Ixquick.

Global Cybersecurity Agenda (GCA) Introduction The Need for International Cooperation Current Models of International Cooperation