Cryptography Reference
In-Depth Information
You also find memo.txt , an important essay by
Bruce Schneier, which you should absolutely
read if you are interested in designing your own
algorithms.
The file cryptanalysis.ps is an introduction by
Schneier into modern cryptanalysis with
practical exercises. If you are shocked by how
difficult the article is, particularly compared to
this topic, you are right ...
PEM directory:
Three RFC files on the PEM standard and two
on RIPEM ( RIPEM.Questions,
RIPEM.Vulnerabilities ).
wpcrack directory:
The crack programs for the WordPerfect
encryption (see Section 3.5.1) widely found on
the Internet; they differ considerably from my
newwprcrack .
chipcrack directory:
andkuhn.html
The fascinating article by Anderson and Kuhn
on hardware analysis, mentioned in
Section 4.4.5, among others. Must read!
crpanahard.html
Considerations on the design and security of
hardware for cryptologic purposes; authors:
Goldberg and Wagner, known by their
exploitation of the small key space in an older
Netscape version (see Section 5.1.4).
dfa10.txt
Improvement by Anderson and Kuhn of the
DFA method by Biham from Section 4.4.5.
rossdes.html
Attack against DES by means of parity and
'burnt-in' memory modules by Anderson (4.4.5).
winnemr.html
Study on the eavesdropping possibilities by
electromagnetic radiation.
cryptana directory:
biham.html, biham.ps,
biham.txt
Description of the DFA attack by Biham (4.4.5).
dpa.txt, dpafaq.txt
Two articles by Kocher, including one on
'differential power analysis', mentioned in
Section 5.10.
Search WWH ::




Custom Search