Cryptography
Algorithms
Blowfish - Twofish - Solitaire - Helix - Phelix - Yarrow - Fortuna - Threefish - SkeinPrograms
Papers
Protocol Analyses:
PGP and GnuPGPPTP
PPTPv2 (MS-CHAPv2)
Chosen Protocol Attack
SSL 3.0
Reaction Attacks
IPsec
E-Mail Encryption Protocols
Pseudorandom Number Generators:
Attacking PRNGsProtocol Designs:
Certified E-MailClueless Agents
Secure Audit Logs
Remote Access to Audit Logs
E-mail Protocol
Remote Gambling
Risks of Key Recovery
Conditional Purchase Orders
Remote Auditing
An Authenticated Camera
Authenticating Software Outputs
Software Metering
Street Performer Protocol
Street Performer 2
Distributed Proctoring
Event Stream Notarization
New Algorithms:
Blowfish- Blowfish--One Year Later
Twofish:
- Description
- Key Schedule
- Differential Characteristics
- Key Uniqueness
- Improved Implementations
- New Results
- Key Schedule 2
- Impossible Differentials
- Related-Key Attacks
- Key Separation
Yarrow PRNG
MacGuffin
Helix
Phelix
Skein and Threefish:
- Description
- Provable Security Support
Miscellaneous Papers:
Mandating Insecurity by Requiring Government AccessDefeating Encrypted and Deniable File Systems
The Psychology of Security
Economics of Information Security
Protecting Secret Keys with Personal Entropy
Performance Comparison of the AES Submissions
Performance Comparison of the AES Finalists
Managed Security Monitoring
Secure System Engineering Methodology
Secure Audit Logs for Computer Forensics
Ten Risks of PKI
Attack Trees
Twofish Team's Comments on AES Selection
AES Key Agility Issues
A Self Study Course in Block Cipher Cryptanalysis
Presentation Slides
Attack Trees (1999 SANS Network Security Conference)Yarrow PRNG (Sixth Annual Workshop on Selected Areas in Cryptography)
A Hacker Looks at Cryptography (Black Hat '99)
Cryptography and Computer Security: Current Technology and Future Trends [audio] (HOPE, 1997)
Miscellaneous
Microsoft PPTP
CMEA Digital Cellular
S/MIME Cracking Screen Saver
Review of TriStrata Public Information
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc..