Cryptography and Network Security for the Internet
Cryptography is the process of making information secret by converting data or text to a coded format to be sent to intended users. The recipient then deciphers the code to obtain the message. The Internet makes sending private messages much more challenging, since anyone with adequate computer skills could potentially tap into a network, intercept a message, and change it or use the information for criminal purposes, which is why effective cryptography is crucial. Using cryptography enables us to prevent our information from getting into the wrong hands, and it is an important aspect of network security.
Classical Encryption Techniques
- Types of Encryption: In this article, the University of Wisconsin explaining some different types of encryption and related concepts.
- Encryption in Defense: The Department of Defense explains how important encryption is to our security.
- Encryption at the IRS: Encryption is very important when dealing with sensitive information such as tax filings.
- The Future of Encryption: The National Science Foundation talks about the development of new encryption technologies in this article.
- Encryption 101: Check out these slides explaining encryption in an easy-to-understand way.
- Galois Field Properties: Rutgers University offers an explanation of the Reed Solomon Galois Fields Theory.
- Validation List: Here is a list of implementations that have been validated as conforming to key agreement schemes.
- Finite Fields in Cryptography: This lecture from Purdue University talks about finite fields and their role in network security.
Advanced Encryption Standard
- Advanced Encryption Standard: This University of Texas presentation examines the basics of the Advanced Encryption Standard.
- Encryption: Check out this document that discusses encryption and its importance in protecting various types of sensitive information.
- Analysis of Advanced Algorithms: If you want a more technical guide on algorithms, cryptography, and encryption, read this analytical report.
Confidentiality Using Symmetric Encryption
Number Theory and Hash Algorithms
Electronic Mail Security
IP Security and Web Security