Beefy Boxes and Bandwidth Generously Provided by pair Networks Bob
Perl: the Markov chain saw
 
PerlMonks  

Re: Using MD5 and the theory behind it

by lzcd (Pilgrim)
on Jan 10, 2001 at 01:24 UTC ( [id://50844]=note: print w/replies, xml ) Need Help??

This is an archived low-energy page for bots and other anonmyous visitors. Please sign up if you are a human and want to interact.


in reply to Using MD5 and the theory behind it

I'd suggest wandering down to local bookshop (Yep somethings still aren't on the net ;) ) and pick up a copy of Bruce Schneier's book 'Secrets and lies'.

He also produces a monthly web-zine called CryptoGram that discusses such topics in 'real world' depth.

RSA also some decent explainations of the technology/maths supporting it in their Tech Library.

Probably the best advice that seems to be floating around right at the moment is:
- Know exactly what you're attempting to trust (as opposed the very rare occation of 'who')
- Realise that no form of encryption is a perfect defence for all. If you assume that anything you create can be broken then you're more likely to build a better system.

Enjoy.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://50844]
help
Sections?
Information?
Find Nodes?
Leftovers?
    Notices?
    hippoepoptai's answer Re: how do I set a cookie and redirect was blessed by hippo!
    erzuuliAnonymous Monks are no longer allowed to use Super Search, due to an excessive use of this resource by robots.