|
Cryptography
-
Cryptography and Security Links
By Ronald L. Rivest,
MIT Laboratory for Computer Science / RSA Data Security.
-
Cryptography FAQ
Cryptography FAQ archived by FAQs.org: Cryptography FAQ,
sci.crypt.research FAQ, RSA Cryptography Today FAQ, Snake Oil FAQ.
-
Cryptography newsgroup sci.crypt FAQ - FTP
-
Encyclopedia of Cryptography and Security
By prof. dr. Henk C. A. van
Tilborg, Technische Universiteit Eindhoven, the Netherlands. Almost 500
topics, made from articles contributed by renowned information security
authors and specialists.
-
NIST CSRC - Computer Security Resource Center
NIST - National Institute of Standards and Technology, EUA.
NIST Cryptographic Toolkit.
-
NSA National Cryptologic Museum
Cryptologic Heritage.
-
RSA Laboratories
RSA Laboratories is the research center of
RSA Security, Ronald L. Rivest.
Bulletins, Challenges, Crypto FAQ, CryptoBytes, RSA Algorithm, PKCS,
Advanced Encryption Standard (AES), Tech Notes, Standards.
- Bruce Schneier
Crypto-Gram, free monthly newsletter by Bruce Schneier,
providing summaries, analyses, insights, and commentaries on security:
computer and otherwise.
Algorithms: Blowfish,
Twofish,
Yarrow PRNG (pseudorandom number generator),
Solitaire.
Password Safe, S/MIME cracking Screen Saver,
Cryptography References.
Counterpane Internet Security.
-
Why Cryptography Is Harder Than It Looks
Bruce Schneier paper at
Insecure.Org.
-
Cryptography A-2-Z
By SSH Tech Corner. Introduction to Cryptography, Algorithms, Protocols
and Standards, Selected Books, Journals, Conferences and Societies,
Online Resources.
-
Beginners' Guide to Cryptography
Classical Cryptography, Modern Cryptography, Puzzles.
Site Map.
-
Vince Cate's Cryptorebel/Cypherpunk Page
Index to cryptography related sites and local information.
-
crypto.com
Matt Blaze's cryptography resource on the Web.
-
Criptografía: Seguridad en la información [In Spanish]
Presentation by Guillermo Morales-Luna, CINVESTAV, Mexico, 2000.
-
IBM Security Library
White papers, Redbooks, Security brochures, Journals, magazines & newsletters,
List of security books, Websites, FAQs, Mailing lists/archives,
Features archive, Glossary, Government security topics.
IBM Security: Technologies
Introduction, Cryptography, E-commerce - Public Key Infrastructure (PKI),
Common Data Security Architecture (CDSA), SET - Secure Electronic Transaction,
Secure Networks (SSL, IPSec, VPN, Firewall), Single Sign-On,
DCE Security Services, Smart cards, Antivirus and Immune Systems.
IBM Security: Standards.
-
Snake Oil Warning Signs: Encryption Software to Avoid
By Matt Curtin, 1998, InterHack.net.
-
Cryptography: The Study of Encryption
Cryptography Web Sites, Publications, FAQs, and References, by Francis Litterio.
-
Crypto Law Survey
By Bert-Jaap Koops. This is a survey of existing and proposed laws and
regulations on cryptography - systems used for protecting information
against unauthorized access - around the world.
See also: Cryptography
and Liberty 2000, An International Survey of Encryption Policy.
By Electronic Privacy Information Center (EPIC), a public interest research
center in Washington, D.C., USA.
-
Thawte General Cryptography FAQs
By Thawte Certification.
A simple FAQ list from Thawte covering Digital certificates, Digital signatures,
Crypto keys and algorithms, Digital hashes and hashing algorithms.
-
IEEE P1363: Standard Specifications For Public Key Cryptography
By IEEE P1363 Working Group, IEEE.
The IEEE P1363 project has as its goal the issuance of Standard
Specifications For Public-Key Cryptography. The main standard document
specifies algorithms in 3 families of cryptographic functions:
discrete logarithm in the group of remainders modulo a prime (DL),
discrete logarithm in the group of points on an elliptic curve over a finite field (EC),
integer factorization (IF). The documentation has a number of annexes,
describing: mathematical and cryptographic background, number-theoretic
algorithms, reasons and security considerations, bibliography.
- Paj's Cryptography
By Paul Johnston. UK. RSA algorithm introduction: Cryptography Basics,
RSA Algorithm, Mathematical Proof, Implementation, Real World Considerations.
Javascript MD4, MD5 and SHA-1 implementations.
-
GnuPG - Links About Cryptography
Pages on cryptology from Werner Koch, GNU PG Project.
-
crypto.yashy.com Cryptography & Security
Robert's Crypto & PGP Links
Catálogo de referências (links) sobre criptografia,
segurança e privacidade. Por Robert Guerra.
-
CryptRing
Security and Cryptography WebRing.
Yahoo! WebRings on Computers & Internet Security:
General, Hacking, Hardware, Networking, Viruses.
-
Yahoo! Directory: Computers and Internet: Security and Encryption
-
North American Cryptography Archives
-
International Cryptography Freedom
-
USA Encryption Export Controls
Bureau of Export Administration (BXA), U.S. Department of Commerce.
-
CDT Encryption Issues
Center for Democracy & Technology (CDT).
- distributed.net
distributed.net is a non-profit organization committed to serving as
a gathering point for topics relating to distributed computing,
primarily based on computers connected to the Internet being used
during "idle" time. Most of distributed.net projects are related to
solve cryptanalysis challenge contests.
-
Theory of Secure Computation
Video speaking by Joe Kilian, NEC Laboratories,
University of Washington, March 30, 2004.
Cryptanalysis
-
A Self-Study Course in Block-Cipher Cryptanalysis
By Bruce Schneier, Cryptologia, v.24, n.1, Jan 2000, pp. 18-34, PDF and
PostScript available.
Also
on Scribd (doc 7277306).
- HashClash Project
Technische Universiteit Eindhoven (TU/e), Netherlands.
Chosen-prefix collision.
Marc Stevens' MSc thesis:
On Collisions for MD5 [PDF], June 2007.
MD5 considered harmful today - Creating a rogue CA certificate, by
Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David
Molnar, Dag Arne Osvik, Benne de Weger; 2008-12-30.
Colliding X.509 certificates for different identities.
-
Further progress in hashing cryptanalysis (PDF)
By Arjen K. Lenstra,
Lucent Technologies, Bell Laboratories, February 26, 2005.
Cryptography Utilities
Cryptography Libraries
-
Cryptographic Libraries
List of full-featured, source-available cryptographic libraries by Adam Shostack.
- See Java APIs
-
Crypto++ Library
Crypto++ Library is a Free C++ Class Library of Cryptographic Schemes.
Written by Wei Dai.
Alternative location.
Crypto++ Reference Manual.
Crypto++ Faq-O-Matic.
Crypto++ SourceForge
Project: source code and FAQ.
Crypto++ Library 5.0.4 [ftp] (Windows DLL, MSVC 6.0, FIPS 140-2 L1 conformance).
-
Cryptlib Security Software Development Toolkit
Cryptlib is a powerful security toolkit which allows even inexperienced
crypto programmers to easily add encryption and authentication services
to their software.
By Peter Gutmann,
New Zealand. Alternate site:
cryptlib.orion.co.nz.
Included are implementations of the most popular encryption and authentication
algorithms: AES, Blowfish, CAST, DES, Triple DES, IDEA, RC2/4/5, Safer,
and Skipjack conventional encryption; MD2/4/5, RIPEMD-160 and
SHA hash algorithms; HMAC with MD5/SHA/RIPEMD-160, and MDC-2 MAC
algorithms; and Diffie-Hellman, DSA, Elgamal, and RSA public-key encryption.
Cryptlib has full X.509 certificate handling, with additional support for
SET, Microsoft AuthentiCode, Identrus, S/MIME, SSL and PKCS #7 certificates.
Cryptlib can also make use of the crypto capabilities of external crypto
devices such as hardware security modules (HSMs), Fortezza cards,
PKCS #11 devices, and smart cards.
Cryptlib is supplied as source code for Unix (static and shared libraries),
DOS, Windows 3.x, Windows 95/98/ME, Windows NT/2000/XP, OS/2, BeOS, Macintosh,
and the Tandem environment; and also as 16- and 32-bit Windows DLL's. cryptlib
is also available as an ActiveX control for Windows, and adaptations exist for
VM/CMS and MVS mainframe environments.
Cryptlib can be used without charge for evaluation, freeware and
shareware applications and for research purposes and non-revenue-generating
personal uses. All commercial use of Cryptlib (revenue-generating purpose in
a company or in an application product) requires a commercial software license
of Cryptlib.
-
MIRACL
Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL).
MIRACL is a Big Number Library which implements all of the primitives
necessary to design Cryptography into your real-world application.
C library with C++ wrapper provided. Full support for Elliptic Curve
Cryptography (ECC), Advanced Encryption Standard (AES), SHA hashes.
MIRACL is FREE for non-profit making, educational, or any non-commercial use.
Any commercial use of MIRACL requires a license from Shamus Software Ltd.
-
Delphi Cryptography and Multiple-Precision Arithmetic
By efg's Reference Library.
-
Network Security Services (NSS)
By Mozilla.org
Network Security Services (NSS) is a set of libraries designed to support
cross-platform development of security-enabled server applications.
Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS
#7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security
standards.
If you want add support for SSL, S/MIME, or other Internet security
standards to your application, you can use Network Security Services (NSS)
to implement all your security features. NSS provides a complete
open-source implementation of the crypto libraries used by Netscape, Sun,
and other companies in a variety of products.
NSS is open-source licensed under Mozilla Public License (MPL) and the GNU
General Public License (GPL).
-
LibTomCrypt
LibTomCrypt is a fairly comprehensive, modular and portable cryptographic
toolkit that provides developers with a vast range of well known
cryptographic algorithms: Block Ciphers with various Chaining Modes,
One-Way Hash Functions, Pseudo-Random Number Generators, Public Key.
LibTomCrypt is free for all purposes under the TDCAL license.
Microsoft
-
Microsoft Platform SDK - Windows Cryptography
About Cryptography: Key cryptography concepts and a high-level view
of Microsoft cryptography technologies.
Using Cryptography: Cryptography processes, procedures, and extended
samples of C and Visual Basic programs using CryptoAPI functions and
CAPICOM objects.
Cryptography Reference: Detailed descriptions of the Microsoft Windows
CryptoAPI - cryptography functions, interfaces, objects, structures,
and other programming elements.
-
Windows 98 Developers Handbook - Chapter 20: Security and Cryptography
Differences in security in Windows 9x and NT, The Win32 security API,
An overview of encryption, The Crypto API.
-
Microsoft .NET Security
MSDN Library.
-
.NET Framework Developer's Guide - Cryptographic Services
.NET Cryptographic Services. Concepts and guide on
securing .NET applications.
-
.NET Framework - System.Security.Cryptography Namespace
The System.Security.Cryptography namespace provides cryptographic
services for .NET, including secure encoding and decoding of data, as
well as many other operations, such as hashing, random number
generation, and message authentication.
Class Library - System.Security Namespace.
Cryptography namespace classes hierarchy.
System.Security namespace Classes Hierarchy.
Prime Numbers
-
The Prime Pages
Prime numbers research, records and resources.
By Chris Caldwell, since 1994.
URL utm.edu.
-
Number Theory - Prime Numbers
Wolfram MathWorld, created, developed and nurtured by Eric Weisstein and
Wolfram Research.
Primality Testing and many other topics.
-
Wikipedia: AKS primality test
From Wikipedia, the free encyclopedia.
The AKS primality test (also known as Agrawal-Kayal-Saxena primality test
and cyclotomic AKS test) is a deterministic primality-proving algorithm
created and published by three Indian Institute of Technology Kanpur
computer scientists, Manindra Agrawal, Neeraj Kayal, and Nitin Saxena on
August 6, 2002 in a paper titled PRIMES is in P.
The authors received many accolades, including the 2006 G�del Prize and the
2006 Fulkerson Prize for this work.
The algorithm determines whether a number is prime or composite within
polynomial time, and was soon improved by others. In 2005, Carl Pomerance
and H. W. Lenstra, Jr. demonstrated a variant of AKS which brings a marked
improvement over the initial algorithm computational complexity.
-
PRIMES is in P
Prof. Manindra Agarwal
and two of his students, Nitin Saxena and Neeraj Kayal (CSE/IITK, India),
have discovered a polynomial time deterministic algorithm to test if an
input number is prime or not. Lots of people over (literally!)
centuries have been looking for a polynomial time test for primality, and
this result is a major breakthrough, likened by some to the P-time solution
to Linear Programming announced in the 70s.
One of the main features of this result is that the proof is concise, clever
and elegant, and relies on very innovative and insightful use of results from
number theory.
Download full paper (original, 9 pp., PDF, 2002-08-06),
PRIMES is in P, v6 (latest version, 9 pp., PDF). Also available
on Scribd (doc 11108887).
PRIMES is in P little FAQ.
Primality Test, MathWorld News.
|