~\Anaconda3\lib\site-packages\pandas_profiling\profile_report.py in ġ0 from pandas_nfig import config > 8 from pandas_profiling.profile_report import ProfileReport > 4 from pandas_profiling._init_ import ProfileReportħ from pandas_ntroller import pandas_decorator ~\Anaconda3\lib\site-packages\pandas_profiling\controller\pandas_decorator.py in > 7 from pandas_ntroller import pandas_decoratorĨ from pandas_profiling.profile_report import ProfileReportĩ from pandas_profiling.version import _version_ ~\Anaconda3\lib\site-packages\pandas_profiling\_init_.py in Ħ from pandas_nfig import Config, config > 3 from pandas_profiling import ProfileReport The Keccak sponge function family - the specific function family used in the winning SHA-3 entry.ModuleNotFoundError Traceback (most recent call last).The Sponge Functions Corner - the SHA-3 competition winner is based on the idea of "Sponge functions" (as opposed to prior major hash functions which used "compression functions"), and this page has some great info on Sponge functions.Postscript files with the same MD5 hash value.Īrticle on X.509 certificate forgery - this was a realĪttack on a Certificate Authority that demonstrated how the MD5 Gives not just meaningless collisions, but very practical examples ofĭifferent programs with the same MD5 hash value, and different With respect its lack of strong collision resistance. Google developers description of OpenIDĬollision Demo has a great overview of the vulnerability of MD5.Ciphertext Indistinguishability article at Wikipedia - this is a little terse, and the models seem to assume a public key crypto model, but otherwise it's a reasonable reference.AES Animation - a very cool flash-based AES animation.CNSSP-15 fact sheet - on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information.Stegdetect/Outguess - detection and steganography tool from Niels Provos.Good article by Gary Kessler on steganography, with examples.Puzzle Baron's Cryptograms - information and online puzzles.Codebreakers by David Kahn is a greak book on the history of cryptography (particularly military history).The Edgar Allen Poe Cryptographic Challenge (Solved in 2000). Material for "Classical Encryption Techniques" Interesting and/or unsolved ciphers CWE/SANS Top 25 Most Dangerous Software Errors - very important stuff for software developers to know!.Writing Secure Code, Second Edition - Book by Michael Howard and David LeBlanc.Build Security In - US-CERT project to improve software assurance.X.200 - Open Systems Interconnection (OSI) - Basic Reference Model.Publishes the " X-series" recommendations, including ITU-T (International Telecommunication Union - Telecommunicaion Standardization Sector) RFC 2340 - Expectations for Computer Security Incident Response.RFC 4949 - Internet Security Glossary, Version 2.Non-protocol documents of particular interest include: Publishes internet standards, protocol definitions (including IP, TCP, TLS, etc.), and other documents as RFCs. Run under the Information Technology Laboratory at NIST, publishes standards for how government systems must be run (including standard cryptographic algorithms such as AES, DSS, etc.) SP 800-61 - Computer Security Incident Handling GuideįIPS (Federal Information Processing Standards).SP 800-57 - Recommendation for Key Management.3 - Recommended Security Controls for Federal Information Systems and Organizations
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |