-
Notifications
You must be signed in to change notification settings - Fork 75
Coding Encryption Brainstorming Notes
- xhtml5 the following page could be the basis of demonstrations of real systems: http://bitwiseshiftleft.github.io/sjcl/demo/
- Some protocols, ideas in 1) Ross Anderson, Security Engineering, 2nd Eds, Wiley. 2) William Stallings and Lawrie Brown, Computer Security: Principles and Practice, 2nd Eds.
- man in the middle attack (apocryphal, but realistic mig in the middle, middle person, playing chess)
- Hromkovic Algorithmic adventures chapter 7
- part V of the Unplugged book introduces cryptography
- http://www.i-programmer.info/babbages-bag/271-public-key-encryption.html
- illustrate PKS with combination lock being distributed
- http://en.wikipedia.org/wiki/Public_key_cryptosystem#A_postal_analogy illustration
- some good sections in chapter 14-20 of Algorithms Unplugged (Vocking et al) - further reading
- showing a worked version of the unplugged kid crypto exercise woud be a solid project
- http://nrich.maths.org/7081 code breaking challenges
- Caesar http://translate.googleusercontent.com/translate_c?depth=1&hl=en&rurl=translate.google.com.hk&sl=de&tl=en&u=http://www.matheprisma.uni-wuppertal.de/Module/Caesar/index.htm&usg=ALkJrhj5PoZFbj5SwKZ9t2l1oms0WXO5ig
- DES http://translate.googleusercontent.com/translate_c?depth=1&hl=en&rurl=translate.google.com.hk&sl=de&tl=en&u=http://www.matheprisma.uni-wuppertal.de/Module/DES/index.htm&usg=ALkJrhiWFCVb6kVo9Cei3ILi_T1MGBgXAw
- http://en.wikipedia.org/wiki/Key_size
- video showing key exchange problem done well http://securitycertificate.net/2010/10/ssl-explained/
- sal127 lesson plan for encryption
- http://dinoonline.net/SecurityTools/SecurityTools.html
- http://www.nsf.gov/cise/csbytes/newsletter/vol2/vol2i7.html
- http://inventwithpython.com/hacking/ (some discussion, and Python code for simple and complex ciphers)
- http://xkcd.com/221/ random number
- http://community.computingatschool.org.uk/resources/2230
.. xtcb e.g. military send a plan in plaintext deliberately, enemy will hear it and send it encrypted to headquarters
.. xtcb curiosity The Enigma famously helped by the Germans encrypting predictable phrases like the weather report [or Heil Hitler] - referred to as a crib that might be somewhere in the message.
.. xtcb curiosity variation of Caesar used (unwisely) by a terrorist http://www.theregister.co.uk/2011/03/22/ba_jihadist_trial_sentencing/
.. xtcb any other terminology defined above?
- http://www.simonsingh.net/The_Black_Chamber/vigenere_strength.html
- http://www.cryptoclub.org/tools/ciphers.php
.. xtcb consider matrix based system e.g. http://www.freepatentsonline.com/article/Australian-Mathematics-Teacher/164525429.html http://search.informit.com.au/documentSummary;dn=152616388598947;res=IELHSS
.. xtcb get ideas from p86-zielinska.pdf e.g. use for DRM
.. xtcb Or, for example, even knowing the profile of communications might give information; (e.g. example of woman emailing doctor, then boyfriend; change to appropriate story; or invite friends to a party without uninvited guests knowing invitations are going out). Can be a problem with cc of email (discloses other recipients).
.. xtcb maybe add more examples/detail sometime: .. public/private key - some good diagrams on web e.g. http://www.astro.princeton.edu/wiki/images/thumb/f/f9/Public_key_encryption.svg/250px-Public_key_encryption.svg.png .. PKS explained: http://www.cimt.plymouth.ac.uk/resources/codes/codes_u10_text.pdf .. consider https://www.youtube.com/watch?feature=player_embedded&v=3QnD2c4Xovk crypto video with mixing paint etc. .. unplugged PK system .. PGP uses pks - do an experiment with this? .. consider http://computer.howstuffworks.com/encryption3.htm .. consider http://xkcd.com/1181/ PGP in email .. consider http://computer.howstuffworks.com/encryption4.htm .. xtcb project: public key evaluation??
Note: Documentation has been moved to the docs
folder of the repository.