Symmetric cryptosystems have a problem: how do you transport the secret key from the sender to the recipient securely and in a tamperproof fashion? If you could send the secret key securely, you wouldn't need the symmetric cryptosystem in the first place (because you would simply use that same secure channel to send your message). Frequently, trusted couriers are used as a solution to this problem. Another, more efficient and reliable solution is a public key cryptosystem, such as RSA, which is used in the popular security tool PGP.
|
The Cypherpunks The Cypherpunks are a virtual community of people interested in the social and political impact of strong cryptographic algorithms. |
|
Digital Cash Links to information about the use of cryptographic algorithms to impliment anonymous and traceable digital case and net-based commerce. |
|
The National Security Agency Web Page The NSA is chartered with U.S. communications security (COMSEC) and foreign signals intelligence (SIGINT). |
|
DigiCrime, Inc. A full-service criminal computer hacking organization. |
|
United States Cryptography Policy Links to help you keep track of the ever-changing landscape of U.S. cryptography policy. What's legal this month and what isn't? |
|
Cryptography Information Sources Cryptography information. Mail me |