Articles and Papers
Adam Back's Home Page
Various intriguing items related to cryptography.
A what's what on cryptography and cryptology.
History of Cryptography
A thorough overview of cryptography's past and present.
Public Key Cryptography and PGP
An overview of the basics of public key cryptosystems and one of the popular public key apps.
Snake Oil Warning Signs
Concise treatise on how to see the steak beyond the marketing sizzle.
Ugly Mistake for Pretty Good
A critical look at why "feature creep" puts PGP security at risk.
Crypto & Security Tutorial of Peter Gutmann
Thorough and informative introduction to cryptography.
Cryptome at John Young's Archive
Current info on matters regarding cryptography, privacy & security.
Export Administration Regulations
U.S. government rules and regulations on the export of cryptography.
The Handbook of Applied Cryptography
The online edition of the book by the same name.
NIST Secure Hash Standard Page
A comprehensive listing of what a product must have to conform to NIST standards.
PGP4Pine: PGP implementation using Pine filters
How to utilize PGP v2.6.2 with Pine on various Unix platforms.
Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
Essay on how key recovery and key escrow threaten crypto security.
(See also: Risks of Key Recovery, Key Escrow, and Third Party Encryption)
Writers welcomed! If you have a technical paper or article pertaining to
security tools and practices, please submit it.