Week 8 - Algorithms and Milkshakes

Created Monday 19 March 2018

../08 - LIS3353 - Milkshakes I.pdf
../08b - LIS3353 More Milkshakes.pdf

How Encryption Works
http://www.theguardian.com/technology/2013/sep/05/how-internet-encryption-works

http://computer.howstuffworks.com/encryption3.htm

https://en.wikipedia.org/wiki/Cryptographic_hash_function

http://www.pcworld.com/article/2905995/truecrypt-audit-shows-no-sign-of-nsa-backdoors-just-some-minor-glitches.html

How encryption fails
http://techreport.com/news/27946/report-cia-compromised-bitlocker-explored-attacking-apple-devices

Apple's Method
http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html

Hashing for Verification
http://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/

Hashing for passwords
http://dustwell.com/how-to-handle-passwords-bcrypt.html

How Bitcoin Works

https://www.coindesk.com/bitcoin-explained-five-year-old/

https://en.bitcoin.it/wiki/How_bitcoin_works



Backlinks: FSU Courses:LIS3353