Network Security and ISO 27001 / 17799 News
  Create an account
:: Home  ::  Downloads  ::  Your Account  ::  Forums  ::


Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.
Site Navigation
· Home
· Contribute Story!
· Downloads
· Encyclopedia
· Feedback Form
· Forums
· Infosecurity
· Iso17799-FAQ
· Legal
· Maillists
· Newsfeeds
· RFCs
· Search
· Stories Archive
· Surveys
· Top 10
· Topics
· Web Links
· Your_Account
User Info
Welcome, Anonymous
Latest: REav
New Today: 0
New Yesterday: 0
Overall: 54703

People Online:
Visitors: 12
Members: 0
Total: 12
Who's Online
There are currently, 12 guest(s) and 0 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
BS7799 and ISO 17799
The following resources should prove to be good starting points for the standards:

Theory & information:
BS7799 & ISO 27001
Official downloads:
BS7799, ISO 17799, ISO 27001
User group for both:
ISO 17799, ISO 27001

Have security issues stalled VoIP deployments within your company?



Votes 140

[ Links Main | Add Link | New | Popular | Top Rated | Random ]

Category: Main/Crypto

Sort Links by: Title (A\D) Date (A\D) Rating (A\D) Popularity (A\D)
Sites currently sorted by: Title (A to Z)

Advanced Encryption Standard (AES) 
Description: Federal Information Processing Standard for cryptography as introduced by the NIST.
Added on: 12-May-2003 Hits: 622
Rate this Site

Alan Turing Home Page 
Description: Inventor of the 'Bombe' which allowed the Allies during WWII to decrypt German Enigma ciphers playing a key role in the outcome of the War.
Added on: 12-May-2003 Hits: 586 Rating: 10 (2 Votes)
Rate this Site | Details

Algebraic Attacks on AES 
Description: In a recent paper, Nicolas Courtois and Josef Pieprzyk show that Rijndael can be written as an overdefined system of multivariate quadratic equations (MQ). For example authors show that for 128-bit Rijndael, the problem of recovering the secret key from one single plaintext can be written as a system of 8000 quadratic equations with 1600 binary unknowns. Thus the security of Rijndael requires that there are no efficient algorithms for solving such systems. In a paper published at Eurocrypt 2000 Shamir et al. describe an algorithm called XL (or/and FXL) that seems to solve such systems in subexponential time. This would mean that the security of ciphers such as Rijndael would not grow exponentially with the number of rounds, a true revolution knowing that classical attacks on block ciphers such as linear/differential or Jakobsen-Knudsen attack are all exponential in the number of rounds.
Added on: 05-Jun-2003 Hits: 716
Rate this Site

American Cryptogram Association (ACA) 
Description: An association which specializes in setting and solving cryptographic problems and puzzles.
Added on: 12-May-2003 Hits: 686
Rate this Site

Bletchly Park - Station X 
Description: During WW2 the German armed forces top secret codes were broken at Bletchley Park, providing the allies with vital information towards their war effort. The world's first programmable computer and other technologies we take for granted today were initiated at Bletchley Park.
Added on: 12-May-2003 Hits: 547
Rate this Site

Description: Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses.
Added on: 05-Jan-2004 Hits: 681
Rate this Site

Center for Quantum Computation 
Description: Information and links to all material in the field of quantum computing and information processing
Added on: 12-May-2003 Hits: 546
Rate this Site

Codes and Ciphers of the Second World War 
Description: In 1991 the Bletchley Park, the wartime home of Allied code breaking, was saved from destruction by Tony Sale and some colleagues. They transformed it into a museum devoted to the recognition and reconstruction of this crucial aspect of world history, which had remained completely secret until the early 1970s.
Added on: 12-May-2003 Hits: 598
Rate this Site

Course in Block Cipher Cryptanalysis 
Description: A self study course from the Bruce Schneier on Block Cipher cryptanalysis.
Added on: 12-May-2003 Hits: 615 Rating: 10 (1 Vote)
Rate this Site | Details

Description: General information and links about cryptography.
Added on: 04-Aug-2003 Hits: 612
Rate this Site

Select Page: 1 2 3   [ Next Page >> ]
CERT Advisories
Currently there is a problem with headlines from this site
Top 10 Active Viruses

Report Incident
-How to Report Internet Related Crime

-Report Computer Threat/Intrusion to NIPC/FBI (Online Form)

PacketDefense Associates


Root Secure

Help Net Security

BCVG Network Security

.:Link to Us:.

Set to your default home page!


Viral Hoaxes
·1 Hotmail hoax
·2 Budweiser frogs screensaver
·3 Bonsai kitten
·4 Olympic torch
·5 MSN is closing down
·6 A virtual card for you
·7 Meninas da Playboy
·8 Bill Gates fortune
·10 Justice for Jamie

Security Resources
Network Security Policies
ISO 27002, ISO 27001 Network security and BS7799 / ISO 17799 / ISO 27001 News
2003 PacketDefense. Network Defense in Depth using ISO 27000
Web site engine's code is Copyright © 2003 by phpnuke dot org. All Rights Reserved. PHP-Nuke is Free Software released under the GNU/GPL.
Page Generation: 0.325 Seconds