Week 9 - Algorithms and Milkshakes

Created Friday 28 October 2016

../LIS3353/10 - LIS3353 - One Way Milkshake Stuff.pdf

How Encryption Works
http://www.theguardian.com/technology/2013/sep/05/how-internet-encryption-works

http://computer.howstuffworks.com/encryption3.htm

https://en.wikipedia.org/wiki/Cryptographic_hash_function

http://www.pcworld.com/article/2905995/truecrypt-audit-shows-no-sign-of-nsa-backdoors-just-some-minor-glitches.html

How encryption fails
http://techreport.com/news/27946/report-cia-compromised-bitlocker-explored-attacking-apple-devices

http://www.tomsguide.com/us/truecrypt-may-be-compromised,news-18861.html

and fixed?
https://threatpost.com/veracrypt-patches-critical-vulnerabilities-uncovered-in-audit/121342/

Apple's Method
http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html

Hashing for Verification
http://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/

https://tiptopsecurity.com/what-is-cryptographic-hashing-md5-sha-and-more/

Hashing for passwords
http://dustwell.com/how-to-handle-passwords-bcrypt.html

How Bitcoin Works
https://en.bitcoin.it/wiki/How_bitcoin_works

http://www.engadget.com/2015/01/21/cryptocurrency-explainer/