Articles & Whitepapers
Books on Security
FAQ's & Tutorials
|To date, cryptography is not something that has crept into the average NT Administrator's Toolkit unless you run an e-business site on the Internet. However, Corporate espionage is on the rise, and international
versions of the NSA's Echelon Project are being copied by other nations. (You mean, you didn't know that ALL of your e-mail is being read by the NSA?) The trend of the future is for all business networks to be
fully encrypted, with digital signatures and secure authentication. Don't get left behind.
FAQ's and Links for Beginners:
Key Technology in Windows 2000
Windows 2000 has a built-in PKI infrastructure. Here, the
authors discuss PKI architecture, interoperability issues, and
applications that use Windows 2000©s PKI infrastructure.
Source: InformIT (March 30, 2001)
RSA Laboratories' Frequently Asked Questions About Today's Cryptography
The fourth version of RSA's FAQ covers the technical mathematics of cryptography as well as export law and basic fundamentals of information security.
SSH's Introduction to Cryptography
A great online course that covers terminology, basic cryptographic algorithms, digital signatures, hash functions, cryptanalysis. attacks on cryptosystems and more!
and Certificate Services
The most common implementation of security on the Internet
today is the use of digital certificates. This chapter discusses
the technology behind security as well as tools provided by
Microsoft for ensuring Internet security. Source: InformIT (March
USENET Cryptology FAQ at SCI.CRYPT
A must read for anyone new to cryptology
Windows 2000 Kerberos Authentication
This downloadable whitepaper provides a technical introduction to how the Windows© 2000 operating system implements the Kerberos version 5 authentication protocol and includes detailed explanations of important concepts, architectural elements, and features of Kerberos
authentication. Source: Microsoft.com
2000 High Encryption Pack
The Windows 2000 High Encryption Pack allows you to enhance your
system with the highest available encryption level (128-bit).
Main Crypto Links
Kerberos: The Network Authentication Protocol
Home of the reference distribution and official documentation for Kerberos.
List of Cryptology and Security Courses
Avi Rubin's great list of University courses being offered around the world.
North American Cryptography Archives
A good page with lots of files. You must affirm that your PC is in the US, you are a legal US Resident, and you understand the US export regulations before entering this site.
PGP International Home Page
PGP (short for Pretty Good Privacy) is a public key encryption program originally written by Phil Zimmermann in 1991. Over the past few years, PGP has got thousands of adherent supporters all over the globe
and has become a de-facto standard for encryption of email on the Internet. If you're not familiar with PGP, stop here first.
RSA Data Security
RSA is well known for their cryptography work, and if you've most likely used used their products without even knowing it. There is a lot of information on this site, but you should check out their Labs FAQ.
The Electronic Privacy Information Center.
Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and include cryptographic primitives for Java and Perl, work is underway on PGP, SSH and
A Cryptology group at Berkley. Be sure to read the Cyphernomicon and check out their FTP
site for a few toys..
Quantum Computation/Cryptography at Los Alamos
This page will give you an overview of the work done at Los Alamos on Quantum Computation and Cryptography as well as related links.
|Articles and Whitepapers
is not the ultimate solution.
A look at the role of
cryptography in IT. The author also explores the theory that
strong encryption could replace firewalls. Source: Network
Windows 2000 Kerberos Interoperability
Microsoft receives many inquiries about Kerberos interoperability in Windows 2000 Server operating systems. This marketing bulletin describes the Microsoft position and provides background information on Kerberos and Windows 2000 Server. Source: Microsoft.com
PKI Options for Next-Generation Security
The Public Key Infrastructure (PKI) market is still in its infancy, but it's rapidly becoming essential for everything from VPNs and e-commerce to remote access and authentication. Here's what you need to know. Source: Network Magazine (March 1999)
Public Key Infrastructure Basics
Building a useful key and certificate management system. Source: Network Magazine (Jan 1999)
© 1999-2003 LabMice.net and TechTarget
All rights reserved
This site and its contents are Copyright 1999-2003 by LabMice.net. Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is
affiliated with LabMice.net. The products referenced in this site are provided by parties other than LabMice.net. LabMice.net makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be
directed to the appropriate manufacturer or vendor.