Link | Description |
---|---|
schneier.com | Bruce Schneier is a noted Cryptography Researcher and Author. His first bestseller, Applied Cryptography, explained how cryptography actually works. This book was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." His current book, Beyond Fear, tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. |
Simon Singh's Cryptography Corner | Simon Singh is the author of "The Code Book". This book covers the history and science of codes and code breaking. In the Crypto Corner, you will find details about The Code Book, information about his TV series based on the book (The Science of Secrecy) and you can explore the Black Chamber, which is an interactive encryption and codebreaking section. You can also find out how to purchase of an Enigma cipher machine and the development of an interactive crypto CD-ROM. |
Philip Zimmermann's Home | Phil Zimmerman is the author of Pretty Good Privacy (PGP). PGP is the most widely used email program in the world. At this site, you can read about Phil, PGP, and access some interesting white papers. |
NIST Special Publications | Here you can download many Special Publications related to cryptography. Included are pubs that deal with a wide variety of sub topics including Asymetric Cryptography, PKI, and VPNs.Note that you will also find the Federal Information Processing Standards (FIPS) here. |
Rainbow Series Library | Rainbow Series. Contains the Orange Book (TSEC), Red Book (TNI), Acqua Book (Glossary), and many others. |
One Time Pads | Here, the one-time pad is examined. This methodology, if used properly, is an unbreakable encryption cryptosystem. At the same time, it appears that practical considerations prevent an unbreakable implementation. For further information, see the NSA's Project Venona site. |
Enigma | The Enigma presents a very well documented case study of the utilization and cryptanalysis of a rotor machine. Work is still being done decrypting existing Enigma encoded messages. |
Polish Engima Page | Noteworthy site presenting a quality view of cryptography. Particular focus on Poland's contribution to the cracking of the Engima machine. | Security Classes | A link to the four security classes that I developed for the University of Houston.Since these pages were created, I've revised the classes. But the goals evolved from those that you will find here. |
CISSP Quiz Page | Best online interactive CISSP quiz site that I've found. |
Why Johnny Can't Encrypt | A paper by Alma Whitten that illustrates the challenges faced by the interface designers of cryptographic products. |
Security Organizations | Various security related sites. |
Georgia State University
Cryptography Lecture |
General Cryptography lecture from Georgia State University. |
Cryptography Syllabus Temple University | This site offers interactive links that illustrate the the Affine Cipher and the Vigenere Cipher. |
My Home Page | Portal to a variety of sites. |