Essay on pitfalls of implementing and using secure systems.
Defines cryptographic terms and concepts, offers crypto scheme comparison, and provides some real world examples.
Provides references for a collection of cryptographic algorithms, assigning each an ASCII name and zero or more aliases.
Features machines and systems used in secure communications. Includes brief history on cryptography.
Project to record and search for mappings of MD5 hashes to their original messages.
Outline of the various types of cipher systems that have been used historically and the relationships between them.
Reference work available for free download (with restrictions) from the Web.
Computers /
Internet /
E-mail /
Encryption
|