
Relevance of Cryptography Examples for Cryptography Usage Source: Britannica (A similar definition can be found on Wikipedia: CrypTool 1.4.30 Its principles apply equally well, however, to securing data flow between computers or to encrypting television signals. . Today the modern (mathematical) science of cryptology contains not only mechanisms for encryption but also for integrity, electronic signatures, random numbers, secure key exchange, secure containers, electronic voting and electronic money, and has achieved to render a broad range of applications in modern life. Project / Outlook / Contactĭefinition Cryptology and Cryptography Cryptology (from the Greek kryptós, "hidden," and lógos, "word") is the science of secure (generally secret) communications. This security obtains from legitimate users, the transmitter and the receiver, being able to transform information into a cipher by virtue of a key ‐‐ i.e., a piece of information known only to them. Although the cipher is inscrutable and often unforgeable to anyone without this secret key, the authorized receiver can either decrypt the cipher to recover the hidden information or verify that it was sent in all likelihood by someone possessing the key.Ĭryptography was concerned initially with providing secrecy for written messages. Password quality mete (PQM) and password entropy 22. Learning tool for number theory and asymmetric encryption 20. Generation of a message authentication code (MAC) 18. Visualisation of symmetric encryption methods using ANIMAL 15. Implementation of CRT in astronomy (solving linear modular equation systems) 14. Secret Sharing using the Chinese Remainder Theorem (CRT) and Shamir 13. Random analysis with 3‐D visualisation 12. Challenges for developersĮncryption with RSA / Prime number test / Hybrid encryption and digital certificates / SSL Digital signature visualised Attack on RSA encryption (modul N too short) Analysis of encryption in PSION 5 Weak DES keys Locating key material (“NSA Key”) Attack on digital signature through hash collision search Authentication in a client‐server environment Demonstration of a side channel attack (on hybrid encryption protocol) (…)Ĭontent (II) III. 4.ĭefinition and relevance of cryptology The CrypTool project Examples of classical encryption methods Insights from cryptography development Prof. Bernhard Esslinger and CrypTool‐Team, Feb. 2009Ĭontent (I) I. Scope, Technology and Future of CrypTool CrypTool 1.4.30 Introduction to Cryptography und Cryptanalysis
