Cryptography Reference
In-Depth Information
Appendix A.1
Sources of Information
The Web site to this topic at www.wileyeurope.com/go/cryptology is not a
'crypto Web site' in the usual sense. People familiar with the matter will miss
several things, or criticize the fact that the world has meanwhile switched to
using the next-but-one release of a popular program. The software and texts on
this Web site are merely intended to help you find further reading and refer-
ences. For example, you will find the popular PGP Release 2.6.3, whereas PGP
9.50 had already been available when this topic went to the print. However, I
selected all software primarily to give you a chance to look inside the source
code and understand how it works.
Some programs (such as book/vigenere/vig crack.c or book/trans/trans.c ) are
demonstration programs to allow you to experience cryptanalysis, or (as with
trans ) see the weaknesses of an algorithm.
Also, there is a large number of texts, including sources for this topic and
further reading sources. I'd have liked to fully explore many highly interesting
texts (e.g., txt/chipcrack/andkuhn.html or txt/enigma/hinsley.txt ) in this topic,
but that would have gone beyond its scope and volume.
You won't find programs of less cryptologic interest, such as dictionary attacks
against Vigenere-encrypted files or pkzip , or programs to break the Microsoft-
Word encryption. Good Internet addresses to look for cryptologic software,
include:
Search WWH ::




Custom Search