Encryption

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(Miscellaneous)
(External links)
Line 70: Line 70:
 
* [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption]
 
* [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption]
 
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal]
 
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal]
* [http://www.bbc.co.uk/news/technology-25506020 Cryptolocker ransomware has 'infected about 250,000 PCs']
 
 
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010]
 
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010]
  
Line 86: Line 85:
 
* [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either]
 
* [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either]
 
* [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss]
 
* [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss]
* [http://krebsonsecurity.com/2014/08/new-site-recovers-files-locked-by-cryptolocker-ransomware/ New Site Recovers Files Locked by Cryptolocker Ransomware]
 

Revision as of 23:30, 15 August 2014

File Format
Name Encryption
Ontology

{{{caption}}}

Contents

Ciphers

Cryptographic hash functions

For non-cryptographic hash functions, see Error detection and correction.

Password hashes

Formats and protocols

Digital rights management (DRM)

Miscellaneous

See also

See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.

External links

Security techniques

Code breaking, bugs, and back doors

Unsolved codes/ciphers

Miscellaneous

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox