Week 7 - Algorithms and Milkshakes

Created Monday 23 October 2017

../08 - LIS3353 - Milkshakes I - T1708.pdf
../09 - LIS3353 More Milkshakes-T1708.pdf

How Encryption Works
http://www.theguardian.com/technology/2013/sep/05/how-internet-encryption-works
http://computer.howstuffworks.com/encryption3.htm
https://en.wikipedia.org/wiki/Cryptographic_hash_function
http://www.pcworld.com/article/2905995/truecrypt-audit-shows-no-sign-of-nsa-backdoors-just-some-minor-glitches.html

How encryption fails
http://techreport.com/news/27946/report-cia-compromised-bitlocker-explored-attacking-apple-devices
http://www.tomsguide.com/us/truecrypt-may-be-compromised,news-18861.html

and fixed?
https://threatpost.com/veracrypt-patches-critical-vulnerabilities-uncovered-in-audit/121342/

Apple's Method
http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html

Hashing for Verification
http://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/
https://tiptopsecurity.com/what-is-cryptographic-hashing-md5-sha-and-more/

Hashing for passwords
http://dustwell.com/how-to-handle-passwords-bcrypt.html

How Bitcoin Works
https://en.bitcoin.it/wiki/How_bitcoin_works
http://www.engadget.com/2015/01/21/cryptocurrency-explainer/



Backlinks: FSU Courses:LIS3353