Research Output
Security and forensic computing: encryption.
  3 ENCRYPTION 90
3.1 Introduction 90
3.2 Simple cipher methods 91
3.3 Encryption operators 94
3.4 Key-based cryptography 96
3.5 Brute-force analysis 103
3.6 Public-key, private-key and session keys 106
3.7 Adding salt 106
3.8 Private-key encryption 108
3.9 Encryption classes 109
3.10 Public-key encryption 114
3.11 One-way hashing 117
3.12 Key entropy 119
3.13 File encryption 120
3.14 Tutorial 120
3.15 Software Tutorial 125
3.16 Web Page Exercises 127
3.17 Network Simulation Tutorial 127

  • Date:

    30 November 2010

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2010). Security and forensic computing: encryption

Authors

Keywords

Authentication; encrytion; firewall; protocols; HTTP; Telnet; FTP; DNS; POP-3; encoding; decoding; code mapping;

Monthly Views:

Available Documents