Monday, 10 March 2014

I'm using Wincrypt for Diffie-Hellman— can I export the shared secret in plain text=?iso-8859-1?Q?=3F?=

I'm using Wincrypt for Diffie-Hellman— can I export the shared secret in
plain text?



1.Public-key cryptography - Wikipedia, the free encyclopedia

Description:Public-key cryptography, also known as asymmetric
cryptography, refers to a cryptographic algorithm which requires two
separate keys, one of which is secret (or ...



2.An Overview of Cryptography - Gary C. Kessler

Description:Defines cryptographic terms and concepts, offers crypto scheme
comparison, and provides some real world examples.



3.The Zfone Project - FAQ

Description:A: Zfone's architecture likely renders that question moot. The
Communications Assistance for Law Enforcement Act applies in the US to the
PSTN phone companies and ...



4.PGP Encryption using Bouncy Castle | Aaron Johnson

Description:It can't be that hard. So given a couple hours of hacking with
the library, here's a fully illustrated example that shows how to encrypt
a file using the Bouncy ...



5.Using Wireshark to Decode SSL/TLS Packets

Description:A great wireshark feature especially for vendor cases is that
it can export SSL session keys into a plain text file. If you don't mind
giving away the clear data in ...



6.Unhandled expression - One commit a day makes the bugs go away

Description:The first rule of security by obscurity is: DON'T. There, I
said it. Now you can stop reading. Or you can continue. But watch where
you step. Security by obscurity ...



7.Hacking Lexicon - Linux Security

Description:A classic exploit that sends more data than a programmer
expects to receive. Buffer overflows are one of the most common
programming errors, and the ones most ...



8.Tutorial: SMTP Transport Layer Security - FEHCom

Description:By construction, neither the MTA protocol SMTP nor the MDA
protocols POP3 and/or IMAP4 provide this level of care and are simple
'plain' transport protocols.



9.EpiJunkie | Sporadic post regarding things I am likely to ...

Description:Background: For years I've wanted to implement WPA2 Enterprise
security for my home wireless network. For years I made slipshod attempts
to do so, something ...



10.Chapter 7: The Role of Cryptography in Information ...

Description:Want to learn more?? The InfoSec Institute CISSP Training
course trains and prepares you to pass the premier security certification,
the CISSP. Professionals that ...

No comments:

Post a Comment