Week 9 - Algorithms and Milkshakes
Created Friday 28 October 2016
../LIS3353/10 - LIS3353 - One Way Milkshake Stuff.pdf
How Encryption Works
http://www.theguardian.com/technology/2013/sep/05/how-internet-encryption-works
http://computer.howstuffworks.com/encryption3.htm
https://en.wikipedia.org/wiki/Cryptographic_hash_function
How encryption fails
http://techreport.com/news/27946/report-cia-compromised-bitlocker-explored-attacking-apple-devices
http://www.tomsguide.com/us/truecrypt-may-be-compromised,news-18861.html
and fixed?
https://threatpost.com/veracrypt-patches-critical-vulnerabilities-uncovered-in-audit/121342/
Apple's Method
http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html
Hashing for Verification
http://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/
https://tiptopsecurity.com/what-is-cryptographic-hashing-md5-sha-and-more/
Hashing for passwords
http://dustwell.com/how-to-handle-passwords-bcrypt.html
How Bitcoin Works
https://en.bitcoin.it/wiki/How_bitcoin_works
http://www.engadget.com/2015/01/21/cryptocurrency-explainer/