Creating a thread in Delphi for an Executable Code Independently

A diagrammatic interlude. Creating a thread in Delphi, Before looking into the details of creating a thread, and getting it to execute code independently of the main application thread, it is necessary to introduce a…

Using the RSA Algorithm for Encryption and Digital Signatures

“Public key cryptography,” a method for encrypting messages to be transmit over an insecure channel, and “digital signatures,” a method for authenticating the author of a message transmitted over an insecure channel, are emerging as…

Server Authentication in SSL Internet Security

Netscape’s SSL-enabled client software always requires server authentication, or cryptographic validation by a client of the server’s identity. As explained in Step 2 of The SSL Handshake, the server sends the client a certificate to authenticate…

The SSL Handshake Approach for Internet Security

The SSL protocol uses a combination of public-key and symmetric key encryption. Symmetric key encryption is much faster than public-key encryption, but public-key encryption provides better authentication techniques. An SSL session always begins with an…

Ciphers Used with SSL in Different Cryptographic Algorithms for Internet Security

The SSL protocol supports the use of a variety of different cryptographic algorithms, or ciphers, for use in operations such as authenticating the server and client to each other, transmitting certificates, and establishing session keys.…

An Introduction to SSL on the World Wide Web Internet Security

Introduction to SSL This document introduces the Secure Sockets Layer (SSL) protocol. Originally developed by Netscape, SSL has been universally accepted on the World Wide Web for authenticated and encrypted communication between clients and servers.…

How SSL Public Key Cryptography Works for Internet Security

AN INTRODUCTION TO KEY CRYPTOGRAPHY This document explains how Netscape uses RSA public key cryptography for Internet security. Netscape’s implementation of the Secure Sockets Layer (SSL) protocol employs the techniques discussed in this document. RSA…

ENIGMA CRYPTANALYSIS FOR CIPHERTEXT-ONLY

  ENIGMA CRYPTANALYSIS FOR CIPHERTEXT-ONLY, Polish and British solutions to encrypted German Enigma traffic relied on sophisticated known plaintext attacks. The rotor wiring was known through brilliant cryptanalysis by the Polish mathematician Marian Rejewski and…

 CRYPTON Hardware Implementation in Advance Encryption Standard (AES)

CRYPTON is selected to be a candidate for the future Advance Encryption Standard (AES) due to its high level of security, feasible implementation, and high performance. The algorithm was provided in software in both C…

Providing a high degree of security by types of Encryption

Filetopia uses many encryption components which provide a high degree of security. For the “Public Key” (PK) functionality, it uses an asymmetric cipher based on “Elliptic Curves” and for symmetric encryption it can use several…