This document lists 10 experiments in information security for fourth year IT students at the Astral Institute of Technology & Research in Indore. The experiments cover topics such as honey pots, encryption ciphers, public key cryptography, the RSA algorithm, Kerberos, SSL/TLS, sniffing and spoofing, malware like viruses and worms, firewalls, and IP-based authentication.
This document lists 10 experiments in information security for fourth year IT students at the Astral Institute of Technology & Research in Indore. The experiments cover topics such as honey pots, encryption ciphers, public key cryptography, the RSA algorithm, Kerberos, SSL/TLS, sniffing and spoofing, malware like viruses and worms, firewalls, and IP-based authentication.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
This document lists 10 experiments in information security for fourth year IT students at the Astral Institute of Technology & Research in Indore. The experiments cover topics such as honey pots, encryption ciphers, public key cryptography, the RSA algorithm, Kerberos, SSL/TLS, sniffing and spoofing, malware like viruses and worms, firewalls, and IP-based authentication.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
Beyond Cryptographic Routing: The Echo Protocol in the new Era of Exponential Encryption (EEE): - A comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, Graph-Theory, Routing and the change from Mix-Networks like Tor or I2P to Peer-to-Peer-Flooding-Networks like the Echo respective to Friend-to-Friend Trust-Networks like they are built over the POPTASTIC protocol