Guide to Cryptography and Some Useful Resources

Cryptography is an art that converts a message from reading design, called "plaintext", one or "ciphertext" that can not be read. This process is called "encrypting". In most cases it must be a way to convert it to a readable format, or "decryping" it, but not always. The cryptography used today has three types.

Hashing

Hiding the message to a string that is not readable for messages to be hidden, but more than checking the contents of the message. The programmer program will offer and download the hash, which is usually used to transfer software or large files.

Symmetric cryptography

Symmetric cryptography uses a key to encrypt a message and can be decrypted with it. Here's your message, your crypto key finds a safe way to decrypt your recipient.

Asymmetric cryptography

Asymmetric cryptography uses two bore keys. The public key is used to encrypt messages, and then uses a private key to decrypt them. The magical part is that the public key can not be used to decrypt the encrypted message.

Top Cryptography and Security Blogs

  • Schneier of security. One of the most popular most popular blogs. Booz has access to airport security from block cipher Christianity.
  • Root Labs rdist. Netbooks and colleagues write in various subjects including hardware implementations, cryptographic timing attacks, DRM, and Commodore 64.
  • Bristol Cryptography Blog. Official Blog of the Bristol Cryptography Research Group University. This is a group blog aimed at croppers and cryptos students.
  • Travis Goodspeed. Travis does interesting things with hardware and life. If you have any interest in hardware security, wireless hacking, or in the meantime, it's a great read.

Cryptography and Security Textbooks

  • Handbook of Applied Cryptography, handmade in the handbook of Mensis, Van Orshotsh, and Vanston. One of the basic textbooks in this area. Basic theory, symmetry, asymmetric cryptography, and protocols. It's not a quick read, you know. This is a very interesting textbook. (Full text can be downloaded for free but can be purchased.)
  • Rose Anderson's Security Engineering. If you have not read this book that is designed or analyzed, you should do so right away. Anderson is a cryptographer, a security expert and a ride. (You can download for free 2001 edition, but better than the 2008 version.)
  • Modern Cryptography Introduction: Jonathan Cats and the Jewish Linden. We use this as a core text in the Hopkins. A mix of practical and theoretical crypto. (One lesson is online.)

Online Courses and Lecture Notes

  • Stanford Online Online Cryptography Course, coach: Dan Bonnah. This course has never been offered. (It starts with 1/23/2012) which teaches Dan Bonnha. If you are looking for a powerful online course, this is one. (Notes, assignments, video lectures.)
  • Stanford, Berkeley Online Safety Course, faculty: Dan Bone, Don Song, John Mitchell. I've talked about Stanford's crippling course, but it's a little more attitudes and less crypto. Starting at 2/2012. (Notes, assignments, video lectures.)
  • Stanford, Berkeley Online Safety Course, faculty: Dan Bone, Don Song, John Mitchell. I've talked about Stanford's crippling course, but it's a little more attitudes and less crypto. Starting at 2/2012. (Notes, assignments, video lectures.)

Useful websites

  • IACR ePrint Archive. This e-print archive hosted by the International Association of Crypologologic Research hosts the latest academic crypto results.
  • Crypto StackExchange. The best social-based crypto Q$A site.
  • WTFCrypto. Minor answers to common questions.

Software

  • OpenSSL, NSS, GNLS, Crypto, Bouncy Costel, Pictrito. Some of the standard Crypto libraries used to secure data on the Internet.
  • Advanced Crypto Software Collection in UT Austin Perform advanced CPO schemes such as attribute-based encryption, pyire and other cool protocols.
  • Charm for Jones Hopkins Python-based framework for rapidly developing 'research' cryptosystems. ECC provides basic support in normal settings, including paraming-based cryptography. Several research crystostyst applications.