57 lines
2.1 KiB
TeX
57 lines
2.1 KiB
TeX
\documentclass{article}
|
||
\usepackage[utf8x]{inputenc}
|
||
\usepackage[margin=1in]{geometry} % Adjust margins
|
||
\usepackage{caption}
|
||
\usepackage{wrapfig}
|
||
\usepackage{subcaption}
|
||
\usepackage{parskip} % dont indent after paragraphs, figures
|
||
\usepackage{xcolor}
|
||
%\usepackage{csquotes} % Recommended for biblatex
|
||
\usepackage{tikz}
|
||
\usepackage{pgfplots}
|
||
\usetikzlibrary{positioning}
|
||
\usepackage{float}
|
||
\usepackage{amsmath}
|
||
\PassOptionsToPackage{hyphens}{url}
|
||
\usepackage{hyperref} % allows urls to follow line breaks of text
|
||
\usepackage[style=ieee, backend=biber, maxnames=1, minnames=1]{biblatex}
|
||
\addbibresource{crypto.bib}
|
||
\usepackage{glossaries}
|
||
\makeglossaries
|
||
\newacronym{DES}{DES}{Data Encryption Standard}
|
||
\newacronym{AES}{AES}{Advanced Encryption Standard}
|
||
\newacronym{RSA}{RSA}{Rivest–Shamir–Adleman Encryption}
|
||
|
||
|
||
|
||
|
||
\title{Cryptography}
|
||
\author{Erik Neller}
|
||
\date{\today}
|
||
|
||
\begin{document}
|
||
\maketitle
|
||
\section{Introduction}
|
||
Cryptography is ubiquitous in our modern world.
|
||
While the origins of cryptography date back thousands of years, evidence of its use in ancient is sparse.
|
||
\cite{luenberger}
|
||
Most of its use seemed to be reserved for political and military leaders, e.g. notably Mary Queen of Scots,
|
||
who while in prison, plotted to kill Queen Elizabeth using encrypted letters \cite{enwiki:maryofscots}.
|
||
With the widespread adoption of the internet, the need for several cryptographical functions arose.
|
||
Due to its intended original use as a trusted research network (ARPANET),
|
||
almost none of the original protocols were 'secure' in any sense of the word.
|
||
Most notably still today is SMTP, the \textit{Simple Mail Transfer Protocol}, used to send email to servers.
|
||
In its original implementation, it allowed attackers to intercept emails in transit to read and modify them
|
||
and even spoof the sender address to impersonate others.
|
||
SMTP today is secured using a combination of mitigations for these attacks, such as STARTTLS, SPF, DKIM and DMARC,
|
||
emphasizing the need for securely designed protocols.
|
||
\section{DES}
|
||
The \acrfull{DES}
|
||
\section{AES}
|
||
\section{RSA}
|
||
\clearpage
|
||
%\printglossary[type=\acronymtype]
|
||
%\printglossary
|
||
\printbibliography
|
||
\end{document}
|