Codes are an important part of every day life. Nowhere is this more applicable than the world of computers and the Internet. Various methods are used to protect information as it is exchanged over a network. This requires a balance of mathematical principles and coding that work together to create increased security measures. Even when a person attempts to buy email lists, there is a certain amount of security that needs to go into the process. Using things like encryption techniques, authentication applications, and even firewalls, it is possible to secure data, protecting both people and their information. When it comes time to buy email lists, it is important for a person to be able to trust where the information is coming from. For those interested in learning more about cryptography, there are email lists that they can join in order to keep up to date with the latest changes being made to both computer and email security.

Classical Encryption Techniques

Finite Fields

Advanced Encryption Standard

Confidentiality Using Symmetric Encryption

Number Theory and Hash Algorithms

  • Euler and His Contribution to Number Theory (PDF): Sometimes, in order to completely understand an idea, it helps to know more about the people involved in its creation and evolution.
  • Hashing Algorithms (PDF): In addition to an explanation of "hashing," this presentation serves to provide information on the type of hashing, how it works, and what implementation looks like.
  • Does Hashing Make Data "Anonymous"? In addition to providing a clearer explanation of what it means to be anonymous when it comes to data, the page also allows several people working for the Federal Trade Commission to weigh in with their opinions on the matter.

Digital Signatures

Authentication Applications

Electronic Mail Security

IP Security and Web Security


Added by Gary Taylor