Click here to start

Table of contents

Cryptography and Cryptology for Sysadmins
Introduction
Topics of Discussion
Definitions
Definitions (continued)
Definitions (3)
Why Cryptography is Important
Historic Problems
Common Basic Cyphers
Substitution Cyphers
Simple Substition Example
Transposition Cyphers
Simple Transposition Example
XOR Based Cyphers
Problems With Basic Cyphers
Problems with Substitution Cyphers
Problems with Transposition Cyphers
Common Attacks
Protocols and Their Problems
Widely Used Systems
DES
DES Deatils
DES Algorithm
AES
AES Details
BLOWFISH/TWOFISH
TwoFish
RC4
RC-4 Continued
RSA Public Key Cyphers
One Time Pads
One-Way Hashes and Secure Hashes
Hash Attacks
Recent Chinese Research
Questions?

Author: Neil Waybright

E-mail: neil@waybright.org

Homepage: http://www.waybright.org/neil