Codes are an important part of every day life. Nowhere is this more applicable than the world of computers and the Internet. Various methods are used to protect information as it is exchanged over a network. This requires a balance of mathematical principles and coding that work together to create increased security measures. Even when a person attempts to buy email lists, there is a certain amount of security that needs to go into the process. Using things like encryption techniques, authentication applications, and even firewalls, it is possible to secure data, protecting both people and their information. When it comes time to buy email lists, it is important for a person to be able to trust where the information is coming from. For those interested in learning more about cryptography, there are email lists that they can join in order to keep up to date with the latest changes being made to both computer and email security.

Classical Encryption Techniques

Finite Fields

Advanced Encryption Standard

Confidentiality Using Symmetric Encryption

Number Theory and Hash Algorithms

  • Euler and His Contribution to Number Theory (PDF): Sometimes, in order to completely understand an idea, it helps to know more about the people involved in its creation and evolution.
  • Hashing Algorithms (PDF): In addition to an explanation of "hashing," this presentation serves to provide information on the type of hashing, how it works, and what implementation looks like.
  • Does Hashing Make Data "Anonymous"? In addition to providing a clearer explanation of what it means to be anonymous when it comes to data, the page also allows several people working for the Federal Trade Commission to weigh in with their opinions on the matter.

Digital Signatures

  • About Securing Messages With a Digital Signature: Even students want to know that certain messages came from the right person without any alterations. This site offers an explanation of what a digital signature is and how to create one.
  • Adobe Acrobat XI Pro: Digital Signatures (PDF): In addition to an explanation of digital signatures, this paper describes the method for creating a digital signature, how to create a digital ID, and how to digitally sign a document.
  • United States Computer Emergency Readiness Team: Understanding Digital Signatures: Why would you need to use a digital signature? This site offers information on what a signature is and how it works to add extra security to a document.

Authentication Applications

  • Authentication Applications (PDF): Network security is an important part of keeping a network and all its users safe. This presentation describes two main types of authentication applications: Kerberos and X.509 authentication.
  • Kerberos: A Network Authentication Protocol: This page gives a detailed description of what Kerberos is and how it works as a solution to network security problems.
  • Federal Financial Institutions Examination Council's Authentication in an Internet Banking Environment (PDF): Financial institutions usually have real concerns about security. This document serves to explain how agencies need to use more than one type of authentication application in order to give people access to their website and services.

Electronic Mail Security

IP Security and Web Security

Firewalls

Added by Gary Taylor