• Main Menu
  • Cryptology

    • GPG (GNU Privacy Guard)

      GPG (GNU Privacy Guard)

      GPG, or GNU Privacy Guard, is a free replacement and competing product for PGP (Pretty Good Privacy). The project is a data encryption and decryption application which provides end-users with a cryptographic privacy and authentication system for communicating electronic data. GPG can be used to sign, encrypt, and decrypt text, for email, files, directories, and

    • Brute Force Attack

      Brute Force Attack

      A brute force attack consists of trying every possible code, combination, or password until the right one is found. Determining the Difficulty of a Brute Force Attack The difficulty of a brute force attack depends on several factors, such as: How long can the key be? How many possible values can each key component have?

    • Kerberos

      Kerberos

      Kerberos is a network authentication protocol which utilizes symmetric cryptography to provide authentication for client-server applications. Kerberos Standard Definition Kerberos is defined in RFC 1510 – The Kerberos Network Authentication Service (V5). Kerberos Architecture The core of  Kerberos architecture is the KDC (Key Distribution Server). The KDC stores authentication information and uses it to securely

    • Wordlists

      Wordlists

      A wordlist is a text file containing a collection of words for use in a dictionary attack. Wordlist Usage A dictionary attack using a wordlist relies on the fact that most users choose weak passwords. Very common passwords include password, computer, work, and most of the popular female names. Common Dictionary Attacks Using A Wordlist

    • Known Ciphertext Attack

      Known Ciphertext Attack

      The known ciphertext attack, or ciphertext only attack (COA) is an attack method used in cryptanalysis when the attacker has access to a given set of ciphertext(s). The attacker does not have access to corresponding cleartext in this method; however, COA is successful when correspdonding plaintext can be determined from a given set of ciphertext.

    • MD5 (Message Digest 5)

      MD5 (Message Digest 5)

      MD5 is a message digest algorithm. MD5 takes a variable length input and produces a 128-bit message digest. MD5 was designed by Ron Rivest in 1991. MD5 is officially defined in RFC 1321 – The MD5 Message-Digest Algorithm. MD5 Usage MD5 is used in many applications, including GPG, Kerberos, TLS / SSL, Cisco type 5

    • Plaintext and Ciphertext

      Plaintext and Ciphertext

      In the study of cryptography the terms plaintext and ciphertext are used to describe the plain language message or information and the resulting encrypted message or data that results from the use of a cipher or encryption algorithm. The resulting ciphertext is not readable by either a human or computer without the correct cipher to

    • GnuPG Shell

      GnuPG Shell

      Everyone likes safety. The safety of confidential information is always of special concern. Therefore, information protection is a necessity and can be useful to companies and individuals who care about their intellectual property’s confidentiality. People who want their e-mails kept confidential and their e-mail attachments readable only to the intended recipient can appreciate information protection.

    • Cryptology

      Cryptology

      The field of cryptology includes both the study of and practice of securing information in the presence of untrusted third parties or adversaries. Specifically, it is focused on creating and analyzing the protocols used to subvert attempts by adversaries to gain access to or interrupt the flow of information between trusted parties. Specific focus areas

    • X.509

      X.509

      X.509 is an ITU-T (ITU Telecommunication Standardization Sector) standard for PKI (Public Key Infrastructure) in cryptography, which, amongst many other things, defines specific formats for PKC (Public Key Certificates) and the algorithm that verifies a given certificate path is valid under a give PKI (called the certification path validation algorithm). X.509 History X.509 began in

    cryptology
    228 queries in 0.274 seconds.