PGP & Cryptography - Encryption:
Comodo - Cryptography Department - RSA Cryptography
See:
Comodo SecureMail & Comodo Disk Encryption: Free for Personal Use!
PGP (Pretty Good Privacy)
Public key cryptography software from Pretty Good Privacy, Inc., San
Mateo, CA, (www.pgp.com). Developed by
Phil Zimmermann, founder of the company, and it is based on the
RSA
cryptographic method. A version for personal, non-business use is
available on various BBSs and Internet hosts. Unfortunately, PGP now owned
by Symantec.
-
MBA Online - Online Cryptology Resources History & Modern
(9/29/2011)
-
Start-up
makes quantum leap into cryptography CNET News.com:
"...radically new technology of quantum encryption."
(11/6/2003)
- www.eWeek.com
- NSA Buys License for Certicom's Encryption Technology:
"...the National Security Agency has purchased a license for
Certicom Corp.'s elliptic curve cryptography (ECC) system, and plans
to make the technology a standard means of securing classified
communications." (10/31/2003).
- Microsoft
Office Assistance: Introduction to Security - "Digital
certificates use a cryptographic technology called public-key
cryptography to sign software publications and to verify the
integrity of the certificate itself. Public-key cryptography uses a
matched pair of encryption and decryption keys called a public key
and a private key."
- msdn.microsoft.com
- What Are Digital Certificates: Office 2000 Programmer's Guide.
- Cryptographic
Network Services: WinXP Embedded
- washingtonpost.com:
Pretty Good Update for E-Mail Privacy (TechNews.com) PGP
1/7/03.
- www.faqs.org/faqs/cryptography-faq/
- www.crypto.com
- www.cryptocard.com
- www.cryptoex.com
- www.cryptography.com
- www.CryptoHeaven.com:
"CryptoHeaven signature
encryption security software, designed for small and mid-sized
businesses - CryptoHeaven provides secure email, online storage and
collaboration software... ...utilizes 256-bit encryption for all data
leaving or entering your computer, adding a second layer of protection
to traditional secure channel transmissions. The entire communication
remains encrypted as it travels through the secure channel pipeline.
Even if the pipeline is broken into, the attacker cannot decipher the
data." (2/23/2003)
- www.elcor.net
- PowerKey (encryption toolkit):
- www.epic.org/crypto/
- www.pgpi.org
- www.pgp.com
-
www.barcodesinc.com/articles/cryptography2.htm
- www.rsasecurity.com/rsalabs/
- Redirects to the Following Link...
- www.rsa.com
- www.phaos.com/products/category/cryptography.html
|
|