# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Accent Office Password Recovery - Tool that helps you recover lost or forgotten passwords to your documents created in Microsoft Office applications: Access, Excel, and Word.
Advanced Office Password Breaker - Guaranteed decryption of file open protected MS Word and Excel files regardless of password length or complexity because the encryption key is cracked, not the password. AOPB can open your file within a week on high end workstations.
Bletchley Park - A heritage site where visitors can explore some of the iconic WWIICodebreaking Huts and Blocks and marvel at the achievements of the codebreakers whose work is said to have helped shorten the war by WWII years.
BitLocker Drive Encryption - A full disk encryption feature included with the Ultimate and Enterprise editions of Windows Vista and Windows 7, the Pro and Enterprise editions of Windows 8 and Windows Server 2008 and later. It is designed to protect data by providing encryption for entire volumes. Also see Wikipedia.
Center for Cryptologic History - Preserves and advances understanding of cryptologic history for National Security Agency (NSA), the United States Intelligence Community, the Department of Defense, other government agencies, academia, and the general public.
CertifiedMail - Provides secure messaging capabilities to more than 300,000 email users around the world in four languages. Standard e-mail lacks encryption capability and other acceptable security measures, such as tracking, message integrity and other attributes of hard copy document delivery services. CertifiedMail technology, based on the Microsoft .Net platform, enhances your existing e-mail system to address these issues.
Certificate Transparency - Google's Certificate Transparency project fixes several structural flaws in the SSL certificate system, which is the main cryptographic system that underlies all HTTPS connections. These flaws weaken the reliability and effectiveness of encrypted Internet connections and can compromise critical TLS/SSL mechanisms, including domain validation, end-to-end encryption, and the chains of trust set up by certificate authorities.
CGSMK CryptoPhone - Company located in Berlin, Germany, that built the first mobile phone that provides strong end-to-end voice encryption with full source code published for review.
CipherShed - An open-source disk encryption program for on-the-fly encryption. CipherShed is based on the discontinued source-available program TrueCrypt. Also see Wikipedia.
CodeBreakers-Journal - Publishes and distributes materials in the field of Algorithms, Virus-Research, Software-Protection, Reverse Code Engineering and Cryptanalysis as well as all other areas of security analysis.
Communications Security Establishment Canada (CSEC) - Canada's national cryptologic agency. Provides the Government of Canada with two key services: foreign signals intelligence (SIGINT) in support of defence and foreign policy, and the protection of electronic information and communication (Information Technology Security). Additionally, CSEC provides technical and operational assistance to federal law enforcement and security agencies.
Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design - The Electronic Frontier Foundation (EFF) raised the level of honesty in crypto politics by revealing that the Data Encryption Standard (DES) is insecure. The U.S. government has long pressed industry to limit encryption to DES (and even weaker forms), without revealing how easy it is to crack. Continued adherence to this policy would put critical infrastructures at risk; society should choose a different course. To prove the insecurity of DES, EFF built the first unclassified hardware for cracking messages encoded with it. On Wednesday, July 17, 1998 the EFF DES Cracker, which was built for less than $250,000, easily won RSA Laboratory's DES Challenge II contest and a $10,000 cash prize. It took the machine less than 3 days to complete the challenge, shattering the previous record of 39 days set by a massive network of tens of thousands of computers. The research results are fully documented in a book published by EFF and O'Reilly and Associates, entitled Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design.
Cryptography Project - Links to papers that Georgetown University computer science professor Dorothy Denning has authored or co-authored and to other selected documents and web pages.
Cryptography Research - Committed to assisting clients and partners in identifying, developing, and implementing cost-effective security solutions. Site contains extensive collection of cryptography resources.
Decryptum - Instant online Word and Excel password removal service.
DigiCert - A U.S.-based Certificate Authority located in Lindon, Uta. Provides digital certificates to over 60,000 customers in more than 146 countries.
Digital Transmission Licensing Administrator (DTLA) - To allow for protected transmission of copy-protected material between digital devices like PC's, DVD Players, and Digital TV's, five companies - Hitachi, Intel, Matsushita (MEI), Sony and Toshiba have prepared the "5C" Digital Transmission Content Protection (DTCP) specification. This site provides informaiton on DTCP.
DVD Copy Control Association (DVD CSS) - A not-for-profit corporation with responsibility for licensing CSS (Content Scramble System) to manufacturers of DVD hardware, discs and related products. Licensees include the owners and manufacturers of the content of DVD discs; creators of encryption engines, hardware and software decrypters; and manufacturers of DVD Players and DVD-ROM drives.
Elliptic Curve Cryptosystem (ECC) - Discovered in 1985 by Victor Miller (IBM) and Neil Koblitz (University of Washington) as an alternative mechanism for implementing public-key cryptography. Public-key algorithms create a mechanism for sharing keys among large numbers of participants or entities in a complex information system. Unlike other popular algorithms such as RSA, ECC is based on discrete logarithms that is much more difficult to challenge at equivalent key lengths. The Certicom ECC Challenge offers an opportunity for people around the world to create new methods of attacking the algorithm and exposing any weaknesses. The longer an algorithm stands up to attack the more confidence developers have in its ultimate security.
Peerio - A cloud-based encrypted communications suite. Available for Android, iOS, Windows, macOS, Linux, and as a Google Chrome extension. Also see Wikipedia.
Signal - An encrypted communications application for Android and iOS. It uses the Internet to send one-to-one and group messages, which can include files, voice notes, images and videos, and make one-to-one voice and video calls. Also see Wikipedia.
WhatsApp - A freeware, cross-platform and end-to-end encrypted instant messaging application for smartphones. It uses the Internet to make voice calls, one to one video calls; send text messages, images, GIF, videos, documents, user location, audio files, phone contacts and voice notes. to other users using standard cellular mobile numbers. Also see Wikipedia.
Evidence Exchange - The first company to provide a system for securely duplicating documents of disparate types so that there is a cryptographically secure link between the copy and the original. This innovative process is called the Secure Digital Photocopier (SDP) and works by taking electronic files of any format and converting them to readable, searchable, printable PDF files, while it fingerprints and digitally notarizes them so they are secure through the entire discovery process.
Exhaustive Search - Blog from Matt Blaze focusing on the architecture and design of secure systems based on cryptographic techniques, analysis of secure systems against practical attack models, and on finding new cryptographic primitives and techniques.
FreeNet - Freenet lets you publish and obtain information on the Internet without fear of censorship. To achieve this freedom, the network is entirely decentralized and publishers and consumers of information are anonymous. Without anonymity there can never be true freedom of speech, and without decentralization the network will be vulnerable to attack. Communications by Freenet nodes are encrypted and are "routed-through" other nodes to make it extremely difficult to determine who is requesting the information and what its content is. Users contribute to the network by giving bandwidth and a portion of their hard drive (called the "data store") for storing files. Unlike other peer-to-peer file sharing networks, Freenet does not let the user control what is stored in the data store. Instead, files are kept or deleted depending on how popular they are, with the least popular being discarded to make way for newer or more popular content. Files in the data store are encrypted to reduce the likelihood of prosecution by persons wishing to censor Freenet content.
Gallery of CSS Descramblers - This site, through examples, points out the absurdity of the position that source code can be legally differentiated from other forms of written expression.
GNU Privacy Guard (GnuPG) - GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME and Secure Shell (ssh). Also see Wikipedia.
Gold-Bug - A short story by Edgar Allan Poe. Set on Sullivan's Island, South Carolina, the plot follows William Legrand, who was recently bitten by a gold-colored bug. The Gold-Bug was an instant success and was the most popular and most widely read of Poe's works during his lifetime. It also helped popularize cryptograms and secret writing. Full text from the Dollar Newspaper (1843).
MIT Distribution Center for PGP (Pretty Good Privacy) - PGP or Pretty Good Privacy is a powerful cryptographic product family that enables people to securely exchange messages, and to secure files, disk volumes and network connections with both privacy and strong authentication.
National Cryptologic Museum - Provides a "peek behind the curtain" at a once-secret world - the exploitation of enemy cryptology and the protection of American communications.
National Institute of Standards and Techology (NIST): Computer Resource Center - Focuses on developing cryptographic methods for protecting the integrity, confidentiality, and authenticity of information resources; and addresses such technical areas as: secret and public key cryptographic techniques, advanced authentication systems, cryptographic protocols and interfaces, public key certificate management, smart tokens, cryptographic key escrowing, and security architectures. Helps enable widespread implementation of cryptographic services in applications and the national infrastructure.
Password Cracking FAQ - A password cracker is any program that can decrypt passwords or otherwise disable password protection. A password cracker need not decrypt anything. In fact, most of them don't. Real encrypted passwords, as you will shortly learn, cannot be reverse-decrypted.
Perfect Forward Secrecy (PFS) - A property of the key-agreement protocol that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the (long-term) private keys is compromised in the future. Also see:
Pretty Good Privacy - Wikipedia backgrounder: "A data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991."
Privacy - Privacy-related news, information, and action.
Quantum Hacking - Research in quantum information and security of quantum cryptography in Norway.
Russian Password Crackers - This site concerns the practical demonstration of cryptography weakness. All software presented here illustrates four main reasons of cryptosystems untrustworthiness: application of weak algorithms, wrong implementation or application of cryptalgorithms and human factor.
Spread Spectrum Image Steganography (SSIS) - Patent information on SSIS. The Spread Spectrum Image Steganography (SSIS) of the present invention is a data hiding/secret communication steganographic system which uses digital imagery as a cover signal. SSIS provides the ability to hide a significant quantity of information bits within digital images while avoiding detection by an observer. The message is recovered with low error probability due the use of error control coding. SSIS payload is, at a minimum, an order of magnitude greater than of existing watermarking methods. Furthermore, the original image is not needed to extract the hidden information. The proposed recipient need only possess a key in order to reveal the secret message. The very existence of the hidden information is virtually undetectable by human or computer analysis. Finally, SSIS provides resiliency to transmission noise, like that found in a wireless environment and low levels of compression.
Symantec Encryption - Symantec's encryption products, now including PGP and Symantec Endpoint Encryption, enable organizations to deliver comprehensive data protection with proven standards-based technology. Our easy-to-deploy solutions provide centralized policy management, accurate compliance-based reporting and true universal management of our encryption products.
Tails - A live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Also see Wikipedia.
Tor Project - Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Also see Tor Blog.
TrueCrypt - Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux.
U.S. Public Policy Council of ACM (USACM) - Chartered as the focal point for ACM's interaction with U.S. government organizations, the computing community, and the U.S. public in all matters of U.S. public policy related to information technology. Each member of USACM is part of at least one of its six committees: Privacy and Security, Intellectual Property, Law, Accessibility, Digital Government, and Voting.Also see USACMmembers page.
VeraCrypt - Adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.
ZixCorp - ZixCorp Email Encryption Services are purchased on the sender side only. Companies and organizations can protect their outbound email through ZixGateway or ZixMail. ZixGateway is a content-aware, policy-based email encryption appliance that automatically scans emails for sensitive information. ZixMail is an easy-to-use desktop email encryption solution that lets users encrypt and decrypt emails and attachments with a single click.
KWSnet is an Internet subject directory providing special attention to U.S. national and international news, the arts, computing, culture, environment, law, literature, media, politics, science and technology. Based in San Francisco, California, KWSnet contains over 125,000 annotated links to resources worldwide. Use Search KWSnet, located at the top of each page, to search within this site. Use Ctrl-F (Windows) or ⌘-F (Mac) to search within individual pages.
KWSnet's Twitter Account provides over 20 curated lists/groupings of Twitter accounts -- from Architecture to Travel -- to assist you in your social networking experience.nbsp;
KWSnet's Zotero Library provides news articles, primary and secondary sources, and bibliographic information for your research. More information on Zotero, a powerful, easy-to-use research tool, can be found at its site. Also recommended, subscribe to RSS content for the latest updates.
KWSnet is completely non-commercial. It has no commercial objective or emphasis. Instead, it is intended for educational purposes, research, and personal use. It is updated regularly.
KWSnet is IPv6 enabled, HTTPS deployed, and fully HTML5 compliant.
KWSnet may be contacted via email with any comments, suggestions or link submissions. KWSnet is designed and maintained, in its entirety, by Kirk W. Smith.