TechTutorials - Free Computer Tutorials  






Encryption and Cryptography Tutorials






Tutorials (17)

Total Tutorials: 5168  |  Added today: 0 Tutorials updated: 02/09/2019



Sort Tutorials By:


Are we heading for Identity Management Federation (Part 2)
 
In this article we will cover federation and the benefits of true federation and how this area is starting to evolve.
Added: 11/22/2013, Hits: 1,010, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Block Party: A Cryptographic Standard Shindig
 
The greatest product of modern cryptography is probably the competition for a new cryptographic standard which will, in the near future, give us a new hash function standard.
Added: 07/04/2007, Hits: 930, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Calamitous Cryptography: The Extortoise and the Haregretful
 
Cryptovirology - cryptography's evil younger sibling. Let's look at how the intensity of this dark science feeds directly from the security of its older, defensive brother.
Added: 06/02/2006, Hits: 880, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Code Signing: Is it a Security Feature?
 
Code signing is a mechanism whereby publishers of software and content can use a certificate-based digital signature to verify their identities to users of the code, thus allowing users to decide whether or not to install it based on whether they trust the publisher. Code signing has been touted as a major security feature, but it’s important for users to understand its uses and its limitations. In this article, we’ll take a look at how code signing works and where it fits into your organization’s security plan.
Added: 06/10/2005, Hits: 972, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Encryption Key Management
 
What needs to be done to effectively store the keys to your encrypted data.
Added: 09/04/2007, Hits: 965, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How secure are password controlled self-decrypting files?
 
The use of passwords to control access to self decrypting executable files is not defensible as a security technique and should be avoided in favor of much stronger techniques such as public key cryptography.
Added: 03/13/2003, Hits: 758, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

ID & Password or PKI for your security?
 
This paper reviews the arguments for and against each mechanism.
Added: 03/13/2003, Hits: 763, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Ideal-to-Realized Security Assurance In Cryptographic Keys (Part 1)
 
In the first installment of this two-part series, we'll cover key length, and relative concerns, such as entropy and how password etiquette affects key space complexity. We'll look at how the length of the key doesn't inherently equate to the security of the key, and why security isn't even just about keys, at all.
Added: 08/29/2005, Hits: 824, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Ideal-to-Realized Security Assurance In Cryptographic Keys (Part 2) - Collision Attacks
 
In the final installment of this two-part series, we'll cover two closely related collision attacks - the birthday attack and the meet-in-the-middle attack. We'll conclude by emphasizing the importance of simplicity through conservatism, and establishing a "golden rule" for instantiating the lengths of many cryptographic values.
Added: 08/29/2005, Hits: 798, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Internet Security Certificate Information Center
 
Are you having Internet security certificate problems with a Web browser or an application? Welcome to visit this information center, where you can enhance your knowledge on security certificates; learn how to use various certificate tools; search and download any certificates.
By:

certificate.fyicenter.com is the Internet security certificate information center. It provides you a large collection of articles on what is X.509-based Public Key Infrastructure (PKI) and public key certificates, tutorials on how to use various certificate tools to verify, and install certificates, certificate database for you search and download Certificate Authority (CA) certificates.

Added: 08/04/2012, Hits: 882, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Introduction to Public Key Infrastructure
 
This guide provides the reader with a basic introduction to key terms and concepts used in a PKI including Certificates, Keys and Authorities. It mentions the features and services used by the PKI and the techniques involved in public key cryptography.
Added: 03/12/2003, Hits: 885, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Milking Tucows: The Udder Truth About Cryptographic Software Reviews
 
It's this piece of writing's duty to inform you of what you can conclude from software reviews, and what you can't.
Added: 07/20/2006, Hits: 794, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Painless Encryption: Intel Advanced Encryption Standard New Instructions (AES-NI)
 
Discussing the importance of encryption, taking a deep dive into Intel AES-NI.
Added: 07/09/2010, Hits: 794, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Protecting EFS Encryption Keys
 
If you have mobile users in your organization, then implementing security can be especially challenging. You must secure the users’ laptops in such a way that if the laptops were lost or stolen that sensitive data would not be compromised. One way of accomplishing this task is by using the Encrypting File System (EFS). In this article, I will explain how to counteract some potential problems when using EFS.
Added: 09/02/2005, Hits: 831, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The Layman's Unconventional Guide to the Advanced Encryption Standard
 
An unconventional, elaborate glance at the mathematics behind the Advanced Encryption Standard, geared towards the non-mathematician.
Added: 06/23/2006, Hits: 546, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The Layman's Unconventional Guide to the Advanced Encryption Standard (Part 2)
 
This article looks at the core of Rijndael – the round transformation – which will be broken down into its four steps: SubBytes, ShiftRows, MixColumns, and AddRoundKey.
Added: 09/29/2006, Hits: 465, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The Simplistic Trio: Three of the Many Musketeers Fighting in the Name of Simplicity
 
Simplicity is a pillar of good cryptography. In this article, we'll cover several "acts" of simplicity, ranging from independence in modularity, reduction of complexity, and conservative threat modeling, along with a final spiel on the importance of using message authentication.
Added: 02/24/2006, Hits: 414, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Items Per Page:







7 Seconds Resources, Inc.