begin crypto
This commit is contained in:
1
.gitignore
vendored
1
.gitignore
vendored
@@ -333,3 +333,4 @@ TSWLatexianTemp*
|
|||||||
# End of https://www.toptal.com/developers/gitignore/api/latex,visualstudiocode
|
# End of https://www.toptal.com/developers/gitignore/api/latex,visualstudiocode
|
||||||
bib
|
bib
|
||||||
*.*-SAVE-ERROR
|
*.*-SAVE-ERROR
|
||||||
|
*.ist
|
||||||
|
|||||||
13
crypto.bib
Normal file
13
crypto.bib
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
@book{luenberger,
|
||||||
|
title={Information science},
|
||||||
|
author={Luenberger, David G},
|
||||||
|
year={2012},
|
||||||
|
publisher={Princeton University Press}
|
||||||
|
}
|
||||||
|
@misc{ enwiki:maryofscots,
|
||||||
|
author = "{Wikipedia contributors}",
|
||||||
|
title = "Mary, Queen of Scots --- {Wikipedia}{,} The Free Encyclopedia",
|
||||||
|
year = "2026",
|
||||||
|
url = "https://en.wikipedia.org/w/index.php?title=Mary,_Queen_of_Scots&oldid=1333198012",
|
||||||
|
note = "[Online; accessed 22-January-2026]"
|
||||||
|
}
|
||||||
25
crypto.tex
25
crypto.tex
@@ -15,7 +15,12 @@
|
|||||||
\PassOptionsToPackage{hyphens}{url}
|
\PassOptionsToPackage{hyphens}{url}
|
||||||
\usepackage{hyperref} % allows urls to follow line breaks of text
|
\usepackage{hyperref} % allows urls to follow line breaks of text
|
||||||
\usepackage[style=ieee, backend=biber, maxnames=1, minnames=1]{biblatex}
|
\usepackage[style=ieee, backend=biber, maxnames=1, minnames=1]{biblatex}
|
||||||
\addbibresource{entropy.bib}
|
\addbibresource{crypto.bib}
|
||||||
|
\usepackage{glossaries}
|
||||||
|
\makeglossaries
|
||||||
|
\newacronym{DES}{DES}{Data Encryption Standard}
|
||||||
|
\newacronym{AES}{AES}{Advanced Encryption Standard}
|
||||||
|
\newacronym{RSA}{RSA}{Rivest–Shamir–Adleman Encryption}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -26,8 +31,26 @@
|
|||||||
|
|
||||||
\begin{document}
|
\begin{document}
|
||||||
\maketitle
|
\maketitle
|
||||||
|
\section{Introduction}
|
||||||
|
Cryptography is ubiquitous in our modern world.
|
||||||
|
While the origins of cryptography date back thousands of years, evidence of its use in ancient is sparse.
|
||||||
|
\cite{luenberger}
|
||||||
|
Most of its use seemed to be reserved for political and military leaders, e.g. notably Mary Queen of Scots,
|
||||||
|
who while in prison, plotted to kill Queen Elizabeth using encrypted letters \cite{enwiki:maryofscots}.
|
||||||
|
With the widespread adoption of the internet, the need for several cryptographical functions arose.
|
||||||
|
Due to its intended original use as a trusted research network (ARPANET),
|
||||||
|
almost none of the original protocols were 'secure' in any sense of the word.
|
||||||
|
Most notably still today is SMTP, the \textit{Simple Mail Transfer Protocol}, used to send email to servers.
|
||||||
|
In its original implementation, it allowed attackers to intercept emails in transit to read and modify them
|
||||||
|
and even spoof the sender address to impersonate others.
|
||||||
|
SMTP today is secured using a combination of mitigations for these attacks, such as STARTTLS, SPF, DKIM and DMARC,
|
||||||
|
emphasizing the need for securely designed protocols.
|
||||||
\section{DES}
|
\section{DES}
|
||||||
|
The \acrfull{DES}
|
||||||
\section{AES}
|
\section{AES}
|
||||||
\section{RSA}
|
\section{RSA}
|
||||||
|
\clearpage
|
||||||
|
%\printglossary[type=\acronymtype]
|
||||||
|
%\printglossary
|
||||||
\printbibliography
|
\printbibliography
|
||||||
\end{document}
|
\end{document}
|
||||||
|
|||||||
Reference in New Issue
Block a user