Snake Oil FAQ
Guide to evaluating the quality and fitness for purpose of cryptography tools.
Adam Back's Homepage: Cypherspace
Find information on some cryptanalytic hacks, breaking weak cryptosystems and links to more cryptography related websites.
Choosing a Good Password
Tips on choosing a difficult to crack password and pitfalls in password selection.
The Cipher Challenge
History of a code cracking competition. Challenge details, how it was solved, winners, essays and photo gallery.
Little sister of the cypherpunk mailing list. Discussion of implementations of strong, robust cryptosystems.
Features machines and systems used in secure communications. Includes brief history on cryptography.
Free monthly email newsletter covering developments in cryptography and other computer security issues.
Ten part FAQ list that is essential reading for any newcomer to cryptography.
Introduction to cryptography, including concepts, key management and application.
Cryptography related articles, downloads, news, links and discussions.
Tim May's CryptoNotes, and an introduction to the Cypherpunks.
Articles describing the first crack of a DES-encrypted message, with some source code and mailing list archives.
Frode Weierud's Cryptology Page
History of cryptography, cipher machines and their simulation, cryptanalysis and other code breaking techniques.
Handbook of Applied Cryptography
Reference work available for free download (with restrictions) from the Web.
Home of HB9CUF
Free cryptographic tools: CryptoUP to secure and transport any kind of file; FindSR helps to analyze ciphertext.
International Association for Cryptologic Research (IACR)
Non-profit scientific organisation intended to further research in cryptology.
International Cryptography Freedom
Links to cryptography related downloads and information from around the world.
MD5 Reverse Lookup
Project to record and search for mappings of MD5 hashes to their original messages.
The Munitions Maker Graphic
Campaign to distribute image (rsa2d.gif) in protest of ITAR regulations that treat encryption as munitions.
Results: 1 2 3 4 5 6 7 Next