• Main Menu
  • Cryptology

    • X.509

      X.509

      X.509 is an ITU-T (ITU Telecommunication Standardization Sector) standard for PKI (Public Key Infrastructure) in cryptography, which, amongst many other things, defines specific formats for PKC (Public Key Certificates) and the algorithm that verifies a given certificate path is valid under a give PKI (called the certification path validation algorithm). X.509 History X.509 began in

    • Chosen Plaintext Attack

      Chosen Plaintext Attack

      A chosen plaintext attack is an attack where the cryptanalyst is able to define his own plaintext, feed it into the cipher, and analyze the resulting ciphertext. Mounting a chosen plaintext attack requires the cryptanalyst to be able to send data of his choice into the device which is doing the encryption, and it requires

    • Block and Stream Ciphers

      Block and Stream Ciphers

      The two most common types of encryption algorithm used in modern cryptography are the block and stream ciphers. The block cipher uses a deterministic algorithm that conducts operations on fixed-length groupings of bits, or blocks. By using a transformation specified by a symmetric key, a block cipher is able to encrypt bulk data, and is

    • Diffie-Hellman

      Diffie-Hellman

      The Diffie-Hellman key exchange was first published by Whitfield Diffie and Martin Hellman in 1976 and is a popular method for exchanging cryptographic keys. The method is one of the most straight-forward examples of key exchanges implemented in the cryptology field and allows two individuals or parties that have not worked together before to establish

    • GPG (GNU Privacy Guard)

      GPG (GNU Privacy Guard)

      GPG, or GNU Privacy Guard, is a free replacement and competing product for PGP (Pretty Good Privacy). The project is a data encryption and decryption application which provides end-users with a cryptographic privacy and authentication system for communicating electronic data. GPG can be used to sign, encrypt, and decrypt text, for email, files, directories, and

    • How to Encrypt an entire Disk

      How to Encrypt an entire Disk

      Sometimes instead of encrypting a file or a set of files, you want to encrypt an entire file system, partition, or disk. One of the chief advantages of this approach is that, once you have entered your encryption key, the encryption becomes transparent to both you and your applications. When you power off your computer,

    • Rubber Hose Cryptology

      Rubber Hose Cryptology

      Rubber Hose Cryptography refers to a file system in which multiple archives are encrypted and hidden on the same disk in a way that makes each archive appear to be the size of the entire disk. Rubber Hose Cryptography is often used to hide illegal or confidential information in an attempt to prevent theft or

    • PGP (Pretty Good Privacy)

      PGP (Pretty Good Privacy)

      PGP (Pretty Good Privacy) is a data encryption and decryption program used in e-mail messaging, encrypting/decrypting texts, files, or even disk partitions, in order to provide security of data. The program was created in 1991, by Phil Zimmerman. Pretty Good Privacy encryption is based on using a serial combination of data compression, hashing, public-key cryptography

    • SHA-1

      SHA-1

      SHA stands for Secure Hash Algorithm. It consists of five hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). The five algorithms are SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. SHA-1 is the most commonly used of the SHA series. Hash algorithms are called secure

    • Cryptanalysis

      Cryptanalysis

      Cryptanalysis is the study of analyzing information systems in order to “discover” or “crack” the hidden or secret aspects of those systems. More specifically, cryptanalysis is the study of breaching cryptographic security systems in order to obtain access to the information contained within encrypted messages without necessarily knowing the cryptographic key used to encrypt the

    cryptology
    229 queries in 0.242 seconds.