Prev Next

How Encryption Works

By: Jeff Tyson

Lots More Information

Related Articles

More Great Links

  • CES Communications. "What is encryption?" May 8, 2004. (Aug. 25, 2008)­ http://www.cescomm.co.nz/about/encryption.html
  • Holzmann, Gerard. "Tales from the encrypt." Inc.com. Dec. 2007. (Aug. 25, 2008) http://www.inc.com/magazine/19971215/1446.html
  • Kay, Russell. "QuickStudy: biometric authentication." Computer World. April 4, 2005. (Aug. 25, 2008) http://www.computerworld.com/securitytopics/security/story/0,10801,100772,00.html
  • The LEDA User Manual. "Symmetric key cryptography." Jan. 9, 2008. (Aug. 25, 2008) http://www.algorithmic-solutions.info/leda_manual/Symmetric_Key_Cryptography.html
  • Martin, Frank. "SSL Certificates HOWTO." The Linux Documentation Project. Oct. 20, 2002. (Aug. 25, 2008) http://tldp.org/HOWTO/SSL-Certificates-HOWTO/index.html
  • Newcomer, Joseph. "Checksum algorithm." Flounder.com. June 15, 2005. (Aug. 25, 2008) http://www.flounder.com/checksum.htm
  • SSH Communications Security. "Cryptographic protocols and standards." (Aug. 25, 2008) http://www.ssh.com/support/cryptography/protocols/
  • SSH Communications Security. "Public key cryptosystems." (Aug. 25, 2008) http://www.ssh.com/support/cryptography/algorithms/asymmetric.html