Cryptography and Network Security for the Internet

Cryptography is the process of making information secret by converting data or text to a coded format to be sent to intended users. The recipient then deciphers the code to obtain the message. The Internet makes sending private messages much more challenging, since anyone with adequate computer skills could potentially tap into a network, intercept a message, and change it or use the information for criminal purposes, which is why effective cryptography is crucial. Using cryptography enables us to prevent our information from getting into the wrong hands, and it is an important aspect of network security.

Classical Encryption Techniques

  • Types of Encryption: In this article, the University of Wisconsin explaining some different types of encryption and related concepts.
  • Encryption in Defense: The Department of Defense explains how important encryption is to our security.
  • Encryption at the IRS: Encryption is very important when dealing with sensitive information such as tax filings.
  • The Future of Encryption: The National Science Foundation talks about the development of new encryption technologies in this article.
  • Encryption 101: Check out these slides explaining encryption in an easy-to-understand way.

Finite Fields

  • Galois Field Properties: Rutgers University offers an explanation of the Reed Solomon Galois Fields Theory.
  • Validation List: Here is a list of implementations that have been validated as conforming to key agreement schemes.
  • Finite Fields in Cryptography: This lecture from Purdue University talks about finite fields and their role in network security.

Advanced Encryption Standard

  • Advanced Encryption Standard: This University of Texas presentation examines the basics of the Advanced Encryption Standard.
  • Encryption: Check out this document that discusses encryption and its importance in protecting various types of sensitive information.
  • Analysis of Advanced Algorithms: If you want a more technical guide on algorithms, cryptography, and encryption, read this analytical report.

Confidentiality Using Symmetric Encryption

Number Theory and Hash Algorithms

Digital Signatures

Authentication Applications

Electronic Mail Security

IP Security and Web Security

  • IPsec and VPNs: A government analysis looks at security controls and standards for virtual private networks.
  • IP Camera Safety: The FTC explains the dangers of using IP cameras and how you can keep your network safe.
  • Web Security Overview: This FCC document gives an overview of cybersecurity, including Web security.
  • Explanation of SSL in Web Security: Columbia University explores the subject of Secure Socket Layer technology and Web security.
  • Legalities of Privacy: The state of Minnesota looks at the legal issues surrounding data security and privacy.

Firewalls

Download Hotspot Shield VPN. It’s Free!

Join over 650 million users already enjoying absolute Internet Freedom around the world by downloading Hotspot Shield VPN.

Start Free Trial