TechTutorials - Free Computer Tutorials  







Encryption and Cryptography Tutorials






Tutorials (25)

Total Tutorials: 6572  |  Added today: 0 Tutorials updated: 09/15/2018



Sort Tutorials By:


Are we heading for Identity Management Federation (Part 2)
 
In this article we will cover federation and the benefits of true federation and how this area is starting to evolve.
Added: 11/22/2013, Hits: 884, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Block Party: A Cryptographic Standard Shindig
 
The greatest product of modern cryptography is probably the competition for a new cryptographic standard which will, in the near future, give us a new hash function standard.
Added: 07/04/2007, Hits: 803, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Calamitous Cryptography: The Extortoise and the Haregretful
 
Cryptovirology - cryptography's evil younger sibling. Let's look at how the intensity of this dark science feeds directly from the security of its older, defensive brother.
Added: 06/02/2006, Hits: 752, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Code Signing: Is it a Security Feature?
 
Code signing is a mechanism whereby publishers of software and content can use a certificate-based digital signature to verify their identities to users of the code, thus allowing users to decide whether or not to install it based on whether they trust the publisher. Code signing has been touted as a major security feature, but it’s important for users to understand its uses and its limitations. In this article, we’ll take a look at how code signing works and where it fits into your organization’s security plan.
Added: 06/10/2005, Hits: 840, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Encryption and Decryption
 
Information on the core technology of cryptography.
Added: 05/15/2000, Hits: 729, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Encryption Key Management
 
What needs to be done to effectively store the keys to your encrypted data.
Added: 09/04/2007, Hits: 833, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How secure are password controlled self-decrypting files?
 
The use of passwords to control access to self decrypting executable files is not defensible as a security technique and should be avoided in favor of much stronger techniques such as public key cryptography.
Added: 03/13/2003, Hits: 630, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

ID & Password or PKI for your security?
 
This paper reviews the arguments for and against each mechanism.
Added: 03/13/2003, Hits: 638, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Ideal-to-Realized Security Assurance In Cryptographic Keys (Part 1)
 
In the first installment of this two-part series, we'll cover key length, and relative concerns, such as entropy and how password etiquette affects key space complexity. We'll look at how the length of the key doesn't inherently equate to the security of the key, and why security isn't even just about keys, at all.
Added: 08/29/2005, Hits: 696, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Ideal-to-Realized Security Assurance In Cryptographic Keys (Part 2) - Collision Attacks
 
In the final installment of this two-part series, we'll cover two closely related collision attacks - the birthday attack and the meet-in-the-middle attack. We'll conclude by emphasizing the importance of simplicity through conservatism, and establishing a "golden rule" for instantiating the lengths of many cryptographic values.
Added: 08/29/2005, Hits: 680, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Internet Security Certificate Information Center
 
Are you having Internet security certificate problems with a Web browser or an application? Welcome to visit this information center, where you can enhance your knowledge on security certificates; learn how to use various certificate tools; search and download any certificates.
By:

certificate.fyicenter.com is the Internet security certificate information center. It provides you a large collection of articles on what is X.509-based Public Key Infrastructure (PKI) and public key certificates, tutorials on how to use various certificate tools to verify, and install certificates, certificate database for you search and download Certificate Authority (CA) certificates.

Added: 08/04/2012, Hits: 765, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Introduction to Encryption
 
Make any enquiry about computer security, and you will almost immediately fall over the terms cryptography and encryption (and also decryption), but what exactly is meant by this?
Added: 03/12/2003, Hits: 664, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Introduction to Public Key Infrastructure
 
This guide provides the reader with a basic introduction to key terms and concepts used in a PKI including Certificates, Keys and Authorities. It mentions the features and services used by the PKI and the techniques involved in public key cryptography.
Added: 03/12/2003, Hits: 765, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Making PKI simple
 
There are much simpler things that can be done with PKI if you don’t set out to conquer the world.
Added: 03/12/2003, Hits: 666, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Milking Tucows: The Udder Truth About Cryptographic Software Reviews
 
It's this piece of writing's duty to inform you of what you can conclude from software reviews, and what you can't.
Added: 07/20/2006, Hits: 668, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Painless Encryption: Intel Advanced Encryption Standard New Instructions (AES-NI)
 
Discussing the importance of encryption, taking a deep dive into Intel AES-NI.
Added: 07/09/2010, Hits: 671, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

PKI - A Technology or a hype too far?
 
PKI has been getting a lot of bad press of late, but is it justified? Has the technology failed or is it a problem of implementation?
Added: 03/12/2003, Hits: 617, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

PKI - managing liability
 
One of the frequently quoted concepts of PKI is that of being able to do business with people you don’t know, with certainty. Who is held liable for these transactions?
Added: 03/12/2003, Hits: 627, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

PKI Certificates - a source of confusion?
 
If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors you will be educated in the need to understand the certificate. The pressure to understand the certificate is so intense that you may even find statements such as, “You sign the document with your certificate”, which any expert will tell you is technically just plain wrong. So what’s going wrong, and why is the situation so confused?
Added: 03/12/2003, Hits: 618, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Protecting EFS Encryption Keys
 
If you have mobile users in your organization, then implementing security can be especially challenging. You must secure the users’ laptops in such a way that if the laptops were lost or stolen that sensitive data would not be compromised. One way of accomplishing this task is by using the Encrypting File System (EFS). In this article, I will explain how to counteract some potential problems when using EFS.
Added: 09/02/2005, Hits: 710, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Page:  1 2   Items Per Page:







7 Seconds Resources, Inc.




IT Showcase