Codes are an important part of every day life. Nowhere is this more applicable than the world of computers and the Internet. Various methods are used to protect information as it is exchanged over a network. This requires a balance of mathematical principles and coding that work together to create increased security measures. Even when a person attempts to buy email lists, there is a certain amount of security that needs to go into the process. Using things like encryption techniques, authentication applications, and even firewalls, it is possible to secure data, protecting both people and their information. When it comes time to buy email lists, it is important for a person to be able to trust where the information is coming from. For those interested in learning more about cryptography, there are email lists that they can join in order to keep up to date with the latest changes being made to both computer and email security.
Classical Encryption Techniques
- Classical Encryption Techniques: Lecture Notes (PDF): Learn more about the building blocks of classical encryption techniques along with helpful definitions and lots of examples.
- Explanation of Classical Encryption Techniques (PDF): Several different techniques are thoroughly covered in this presentation, including substitution, transposition, and product ciphers.
- A Review on Classical and Modern Encryption Techniques (PDF): Classical and modern encryption techniques are investigated and then compared here.
- Introduction to Finite Fields and Their Applications (PDF): Starting with algebraic equations, this paper touches on how finite fields work and how they can be used in everyday life.
- Efficient Software Implementation of Finite Fields With Applications to Cryptography (PDF): This paper explains how finite fields can be incorporated into computer technology, with the end result being added security.
- Finite Fields and Cryptology (PDF): Featured in the Computer Science Journal of Moldova, this paper seeks to discuss large finite fields in relation to cryptographic schemes.
Advanced Encryption Standard
- A Stick Figure Guide to the Advanced Encryption Standard (PDF): For those new to the advanced encryption standard, it isn't always an easy concept to grasp. Check out this stick figure explanation that provides the most important details.
- National Institute of Standards and Technology: Advance Encryption Standard (PDF): Listed are the expectations for certain government departments that work with sensitive material that needs cryptographic protection.
- 128-Bit AES Decryption (PDF) This document provides more than just an explanation of the Advanced Encryption Standard. It also describes different types of controllers and instances of AES in both hardware and software design.
Confidentiality Using Symmetric Encryption
- Encryption 101 (PDF): Take a look at this presentation that demonstrates how encryption plays an important role in information security and privacy.
- Secure Communication Using Symmetric and Asymmetric Cryptographic Techniques (PDF): This paper describes how to properly send transmissions of information using a satellite while ensuring that it is protected from any type of security threat.
- A Review on Securing Distributed Systems Using Symmetric Key Cryptograpy (PDF): DES and AES, two popular symmetric key cryptography algorithms, are looked at in depth, evaluated, and compared to one another here.
Number Theory and Hash Algorithms
- Euler and His Contribution to Number Theory (PDF): Sometimes, in order to completely understand an idea, it helps to know more about the people involved in its creation and evolution.
- Hashing Algorithms (PDF): In addition to an explanation of "hashing," this presentation serves to provide information on the type of hashing, how it works, and what implementation looks like.
- Does Hashing Make Data "Anonymous"? In addition to providing a clearer explanation of what it means to be anonymous when it comes to data, the page also allows several people working for the Federal Trade Commission to weigh in with their opinions on the matter.
- About Securing Messages With a Digital Signature: Even students want to know that certain messages came from the right person without any alterations. This site offers an explanation of what a digital signature is and how to create one.
- Adobe Acrobat XI Pro: Digital Signatures (PDF): In addition to an explanation of digital signatures, this paper describes the method for creating a digital signature, how to create a digital ID, and how to digitally sign a document.
- United States Computer Emergency Readiness Team: Understanding Digital Signatures: Why would you need to use a digital signature? This site offers information on what a signature is and how it works to add extra security to a document.
- Authentication Applications (PDF): Network security is an important part of keeping a network and all its users safe. This presentation describes two main types of authentication applications: Kerberos and X.509 authentication.
- Kerberos: A Network Authentication Protocol: This page gives a detailed description of what Kerberos is and how it works as a solution to network security problems.
- Federal Financial Institutions Examination Council's Authentication in an Internet Banking Environment (PDF): Financial institutions usually have real concerns about security. This document serves to explain how agencies need to use more than one type of authentication application in order to give people access to their website and services.
Electronic Mail Security
- Security Controls Over the FDIC's Electronic Mail Infrastructure (PDF): While some security was already in place, the FDIC sought to add even more elements of security to protect information sent over email.
- Email Security: An Overview of Threats and Safeguards: In order to protect emails, it is important to understand what threats are out there and what can be done to prevent a breach.
- Securing Email: This paper discusses encryption and decryption in relation to email security, current threats, and methods for creating secure emails.
IP Security and Web Security
- Technical and Economic Assessment of Internet Protocol, Version 9: Upgrading the Internet Protocol is one way to gain added security. However, the upgrade often comes with a financial cost.
- A Security Architecture for the Internet Protocol (PDF): This paper discusses the implementation of security when it comes to the Internet Protocol layer and discusses the three components involved in its implementation.
- Internet Protocol Version 6: Federal Agencies Need to Plan for Transition and Manage Security Risks (PDF): The U.S. Government Accountability Office explains how different agencies need to make the change over to a new version of IP while taking a closer look at the associated risks of lack of security.
- A History and Survey of Network Firewalls (PDF): While firewalls offer network security, there is a lot that goes into implementing them and creating filtering rules.
- Network Communication and Firewalls: This chapter explains what a firewall is, what it does, and how it filters the flow of traffic through a network.
- Understanding Firewalls and Their Uses: This page looks to examine several different types of firewalls and how they provide an extra layer of security.
Added by Gary Taylor