Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) (→External links) |
Dan Tobias (Talk | contribs) (→External links) |
||
Line 41: | Line 41: | ||
== External links == | == External links == | ||
− | + | ||
− | + | === Security techniques === | |
− | + | ||
* [http://boingboing.net/2013/02/22/secure-documents.html One way to keep your documents secure...] | * [http://boingboing.net/2013/02/22/secure-documents.html One way to keep your documents secure...] | ||
− | |||
− | |||
− | |||
− | |||
* [https://mashable.com/2013/06/28/encryption-apps/ Is It the Dawn of the Encryption App?] | * [https://mashable.com/2013/06/28/encryption-apps/ Is It the Dawn of the Encryption App?] | ||
− | |||
* [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process] | * [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process] | ||
* [http://blogs.fsfe.org/greve/?p=634 STEED: project to create nonproprietary encryption] | * [http://blogs.fsfe.org/greve/?p=634 STEED: project to create nonproprietary encryption] | ||
− | |||
− | |||
* [https://www.schneier.com/blog/archives/2013/10/defending_again_1.html Defending Against Crypto Backdoors] | * [https://www.schneier.com/blog/archives/2013/10/defending_again_1.html Defending Against Crypto Backdoors] | ||
* [http://www.darkmail.info/ Dark Mail Alliance] - developing end-to-end encryption for e-mail | * [http://www.darkmail.info/ Dark Mail Alliance] - developing end-to-end encryption for e-mail | ||
− | |||
− | |||
* [http://www.flossmanuals.org/news/floss-manuals-content-being-used-cryptoparties FLOSS Manuals content being used in CryptoParties] | * [http://www.flossmanuals.org/news/floss-manuals-content-being-used-cryptoparties FLOSS Manuals content being used in CryptoParties] | ||
* [http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/ Cryptography Breakthrough Could Make Software Unhackable] | * [http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/ Cryptography Breakthrough Could Make Software Unhackable] | ||
− | * [http:// | + | |
+ | === Code breaking, bugs, and back doors === | ||
+ | * [http://www.schneier.com/blog/archives/2012/12/breaking_hard-d.html Breaking Hard-Disk Encryption] | ||
+ | * [http://blog.whitehatsec.com/cracking-aes-256-dmgs-and-epic-self-pwnage/ Password Cracking AES-256 DMGs and Epic Self-Pwnage] | ||
+ | * [http://www.wired.com/wiredscience/2013/06/quantum-cryptography-hack/ Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not] | ||
+ | * [http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html SSL: Intercepted today, decrypted tomorrow] | ||
+ | * [http://boingboing.net/2013/09/05/report-nsa-slices-through-mos.html Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden] | ||
* [http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/ Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping] | * [http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/ Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping] | ||
+ | * [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption] | ||
+ | * [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal] | ||
+ | * [http://www.bbc.co.uk/news/technology-25506020 Cryptolocker ransomware has 'infected about 250,000 PCs'] | ||
+ | * [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010] | ||
+ | |||
+ | === Unsolved codes/cyphers === | ||
+ | * [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | ||
+ | * [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library] | ||
+ | * [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | ||
+ | * [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message] | ||
+ | |||
+ | === Miscellaneous === | ||
+ | * [http://cryptofloricon.com/ Cryptofloricon: send a message with flowers] (not a ''secret'' one, though, since the decryption key is on the website!) |
Revision as of 00:51, 26 March 2014
Contents[hide] |
Ciphers
Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
Formats and protocols
- Cryptoloop
- DissidentX
- dm-crypt
- Loop-AES
- LUKS
- OpenSSL salted format
- PGP
- Silent Circle Instant Messaging Protocol
- SSL
- TrueCrypt
Digital rights management (DRM)
- Content Scramble System (used on DVDs)
Miscellaneous
See also
See also Security. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
External links
Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Cryptolocker ransomware has 'infected about 250,000 PCs'
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
Unsolved codes/cyphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)