tailieunhanh - Module 25 Cryptography
Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries | M c E H Certified Ethical Hocker Ethical Hacking and Countermeasures Version 6 Module XXV Cryptography IM c E H News Certified Ethical Hacker InformatioriWsek BUSINESS INNOVATION POWERED DYTECNNILISY Jihadists Get Encryption upgrade Until recently al-Qaida didn t pose much of a tine at online because it used outdated technology. Hating modern encn ption tools changes the equation By Thomas Claburn Inform ationWeek Jan. 25 2008 URL http story articlelD 20591829E Last week an Islamist Web site called Al-Ekhlas released updated encryption software to help keep secret communications from prying eyes. The site IS allegedly frequented by al-Qaida supporters. According to the Middle East Media Research Institute the first version of the software Mujahideen Secrets was released a year ago as the first Islamic computer program for secure exchange of information on the Internet. MEMRI says that the program includes the five best encryption algorithms and with symmetrical encryption keys 256 bit asymmetrical encryption keys 2048 bit and data compression tools . Reuters reports that the new version of the software Mujahideen Secrets 2 was developed by Al-Ekhlas in order to support the mujahideen holy war fighters in general and the al Qaeda-linked group Islamic State in Iraq in particular. The Al-Ekhlas Web site is hosted by Florida-based Noc4hosts. Calls and e-mail to the company were not returned. In an e-mail message Paul Henry VP of technology evangelism at Secure Computing said that until recently al-Qaida didn t pose a credible threat online because of its use of outdated technology. Having modem encryption tools he said changes the equation. Source http Copyright by Ec-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited IM c EH Scenario Certified Ethical Hacker Larry was working on a high-end project. He was expecting a promotion for his good performance. But he was disappointed .
đang nạp các trang xem trước