HostedDB - Dedicated UNIX Servers

-->
Internet Security Professional Reference:Encryption Overview
Previous Table of Contents Next


Crypto Links

Visit the following sites on the Internet to find more information about cryptography and security.

Table 10.7
Where to Find Additional Information About Cryptography in General

Site Name Address

RSA’s Crypto FAQ http://www.rsa.com/PUBS/
Ron Rivest’s Links—possibly the http://theory.lcs.mit.edu/~rivest/crypto security.html
most complete set of links on the web
Peter Gutmann’s Security and http://www.cs.auckland.ac.nz/~pgut001/links.html
Encryption-related Resources and Links
Terry Ritter’s Cyphers by Ritter web page http://www.io.com/~ritter/
Terry Ritter’s Cryptographic glossary http://www.io.com/~ritter/GLOSSARY
The Computer Virus Help Desk has http://iw1.indyweb.net/~cvhd/crypto.html
a good archive of encryption software and information

Summary

Despite the complexities of the underlying encryption mechanisms, readers will be pleased to know that implementing cryptographic systems has become easy. Product suites from major vendors such as Microsoft (http://www.microsoft.com) and Netscape (http://www. netscape.com) include all the tools you need to set up internal security servers, certificate servers, and merchant servers (for electronic commerce on the Internet).

In addition, cryptographic systems are more secure due to the use of longer keys. Public acceptance of asymmetric public key schemes such as RSA means that secure electronic commerce will become pervasive. More and more users are obtaining certificates that let them participate in business on the Internet. Now that many of the details for implementing secure systems are taken care of in off-the-shelf software, system administrators only need to make sure they implement those systems properly.


Previous Table of Contents Next