-
May 7th, 2005, 08:48 PM
#1
Junior Member
Encryptions Algorithms
Sup
I understand encryption and how it works but am only familiar with certain algorithms, Ex:
blowfish
MD5
DES
I know there are alot more algorithms, and would like a list of either the most popular and effective or all of them. Any maybe if yall know any links that may discuss this in a descriptive manner, please let me know. Thanx
-
May 7th, 2005, 10:00 PM
#2
I took an intro course last semester on computer security (the encryption part of it). We covered:
RSA (based on not being able to factor large (200 digit) numbers into two primes)
Public-key Cryptography
DES (leads to 3-DES and AES; two modern techniques)
I can't remember what else we went over. Some of it is mathematically intensive. For RSA, I'd suggest reading on Galois Fields.
The links are introductory material on the algorithms but work through them. Let me know if you have any trouble.
\"When you say best friends, it means friends forever\" Brand New
\"Best friends means I pulled the trigger
Best friends means you get what you deserve\" Taking Back Sunday
Visit alastairgrant.ca
-
May 8th, 2005, 12:31 AM
#3
Hi
BUDsmoker, as starting point I really can recommend wikipedia.org[1].
A few comments: There are two completely different kind of issues,
which are likely to be confused:
1. Encryption ciphers[2]
Encryption algorithms are used to encrypt and decrypt a message and
can be divided into two parts: Symmetric ones, like 3DES[3] and AES[4]
(the de-facto standards) , and asymmetric ones, like RSA[5] and Diffie-Hellman[6].
2. Hashing functions[7]
Hashing functions convert an input (typically a file) into a "hash"-value of
certain length. The main purpose is to confirm integrity. The two most famous
ones are MD5[8] and SHA1[9].
Note: Hashing functions cannot be used to encrypt/decrypt a message.
Knowing the hash does not contain enough information to reconstruct
the message uniquely (I am not talking about passwords here ).
Cheers and happy reading
[1] http://www.wikipedia.org
[2] http://en.wikipedia.org/wiki/Encryption_algorithm
[3] http://en.wikipedia.org/wiki/3DES
[4] http://en.wikipedia.org/wiki/AES
[5] http://en.wikipedia.org/wiki/RSA
[6] http://en.wikipedia.org/wiki/Diffie-Hellman
[7] http://en.wikipedia.org/wiki/Hash_function
[8] http://en.wikipedia.org/wiki/MD5
[9] http://en.wikipedia.org/wiki/SHA1
If the only tool you have is a hammer, you tend to see every problem as a nail.
(Abraham Maslow, Psychologist, 1908-70)
-
May 8th, 2005, 12:35 AM
#4
Junior Member
Thanx
You clarified that alot more for me, I appreciate your help
-
May 8th, 2005, 07:52 PM
#5
you'll find some decent white papers on the subject at :
http://neworder.box.sk/
Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|