Lex Mercatoria

www.lexmercatoria.org

www.jus.uio.no/lm

  toc   scroll    txt   pdf   pdf    odt    A-Z  Document Manifest   home 
<< previous TOC next >>
< ^ >

Lex Mercatoria: Electronic Commerce and Encryption Pages

Electronic Commerce & Encryption

Electronic Commerce Documents

Cryptography /Encryption

Agreements
Interest Groups
Industry
AES Algorithm (Advanced Encryption Standard)
NIST AES
AES Winner announced October 2nd, 2000
Data Encryption Standard (DES)
Reference & Links
Security Software
Secure Point to Point Connection and File Sharing
Encrypted Files and Mail
Linux Encryption Solutions
Steganography
Organizations
Commercial
Other
Biometrics
Quantum physics cryptography

Digital Signatures

Electronic Contracts and Electronic Commercial Documents

EDI - Electronic Data Interchange

Electronic Payments

Solutions
Discusion
Writings and Links to them

Authentication Solutions - Virtual Identities

Government and other Documents: Stands/Approaches to Electronic Commerce

Cybercrime

Privacy

NoN-Privacy / Security?

Interest Groups & Campaigns

Industry

Electronic Commerce Resource Sites

Endnotes

Endnotes

Metadata

SiSU Metadata, document information

Manifest

SiSU Manifest, alternative outputs etc.

Lex Mercatoria: Electronic Commerce and Encryption Pages

Lex Mercatoria

copy @ Lex Mercatoria

Lex Mercatoria: Electronic Commerce and Encryption Pages

Electronic Commerce & Encryption

Cryptography /Encryption

Agreements
Interest Groups
Industry
AES Algorithm (Advanced Encryption Standard)
NIST AES
AES Winner announced October 2nd, 2000
Data Encryption Standard (DES)
Reference & Links
Security Software
Secure Point to Point Connection and File Sharing
Encrypted Files and Mail
Linux Encryption Solutions
Steganography
Organizations
Commercial
Other
Biometrics
Quantum physics cryptography

This list does not attempt to be exhaustive. It provides links to sources we have found particularly useful, and to other more comprehensive lists of sources on the subject.

Elsewhere off this site: Electronic Commerce compendium

Cryptography applied in various ways and circumstances is essential for security and trust:

  • confidentiality
  • integrity
  • authentication
  • non-repudiation
  • In sum, read, cryptography impacts upon every aspect of considered e-commerce and private e-business relations.

    #agreements Agreements

    #groups Interest Groups

    #aes AES Algorithm (Advanced Encryption Standard)

    #reference Reference

    #software Security Software

    A Short History of Cryptography by Fred Cohen from Introductory Information Protection "a book about keeping people and organizations from harm caused by information. It requires little or mathematics and is suitable as a text for a graduate level or advanced undergraduate course." Fred Cohen & Associates

    Industry

    TRUSTe

    NIST AES

    AES Algorithm Advanced Encryption Standard (AES) Development Effort, Computer Security Division, National Institute of Standards and Technology, NIST is an agency of the U.S. Commerce Department's Technology Administration see Encryption toolkit Advanced Encryption Standard of the National Institute of Standards and Technology (NIST)

    Report

    "SPECIAL NOTE - Intellectual Property NIST reminds all interested parties that the adoption of AES is being conducted as an open standards-setting activity. Specifically, NIST has requested that all interested parties identify to NIST any patents or inventions that may be required for the use of AES. NIST hereby gives public notice that it may seek redress under the antitrust laws of the United States against any party in the future who might seek to exercise patent rights against any user of AES that have not been disclosed to NIST in response to this request for information."

    "Our goals are to strengthen the U.S. economy and improve the quality of life by providing the information technology industry and users with needed measurements and standards and to provide NIST with high quality information technology services."

    AES entry on Wikipedia

    AES Winner announced October 2nd, 2000

    Rijndael by Joan Daemen and Vincent Rijmen   of Belgium.

    publications Vincent Rijmen list DBLP Bibliography Server list 2everything

    Joan Daemen list DBLP Bibliography Server list 2everything

    Cryptix

    The Rijndael algorithm is based on a block cipher algorithm (The Block Cipher Square Algorithm) described in an article in the October, 1997 issue of DDJ  

    6{ 5 Finalists, August 1999

    Twofish

    Serpent

    MARS

    RC6

    Data Encryption Standard (DES)

    Strong Encryption Package Federal Information Processing

    Announcing the Standard for Data Encryption Standard (DES) FIPS PUB 46-2, Supersedes FIPS PUB 46-1, 1988 January 22 Federal Information Processing Standards Publication 46-2 1993 December 30.

    Security pointers by Tom Dunigan

    Security and Cryptography by Mark McCutcheon

    Crypto Page Paulo Barreto

    Cryptography Francis Litterio

    Security & Cryptography standards by Michael Waidner

    Security and Encryption * Quick Links

    Mitre CVE - Security Dictionary of Common Vulnerabilities and Exposures

    Secure Point to Point Connection and File Sharing

    Open Secure Shell - openSSH

    Linux FreeS/WAN Secure point to point connection anywhere on the Internet, Strong Encryption. Developed outside the United States and not subject to US export restrictions.

    Linux PPTP Server the PPTP Linux Server works with WinNT PPTP clients and C. S. Ananian's PPTP Linux clients. Virtual Private Networking technology enables the use the public Internet backbone for private data communications, encryption and encapsulation technology, permitting the carving out of a private channel/passageway through the Internet.

    Bizee free download of V-ONE technology that permits secure connection with other users of the same technology. It performs authentication and uses 168-bit Triple DES encryption to secure e-commerce, as well as to encrypt data being transmitted as part of auctions, chat rooms, e-mail and classified advertisements. Adequate security has been a big obstacle to business-to-business commerce to date... July 1999

    Gnut Linux/Unix console gnutella clone

    Freenet (The Free Network Project Homepage) "Re-Wiring the Internet". Hosted by Source Forge "Freenet is a peer-to-peer network designed to allow the distribution of information over the Internet in an efficient manner, without fear of censorship. Freenet is completely decentralized, meaning that there is no person, computer, or organisation in control of Freenet or essential to its operation. This means that Freenet cannot be attacked like centralized peer-to-peer systems such as Napster. Freenet also employs intelligent routing and caching meaning that it learns to route requests more efficiently, automatically mirrors popular data, makes network flooding almost impossible, and moves data to where it is in greatest demand. All of this makes it much more efficient and scalable than systems such as Gnutella."

    Mojo Nation claimed to be "a revolutionary new publishing and content-sharing network. [That]combines the flexibility of the marketplace and the distributed computing power of the Internet to go far beyond current filesharing systems... Mojo Nation is building an efficient, massively scalable and secure marketplace for distributors and consumers of digital content."

    Wheres dot com Internet file sharing programs

    Encrypted Files and Mail

    #linux Linux Solutions

    #commercial Commercial

    Speak Free Secure fully encrypted Chat Program

    HushMail web based secure e-mail

    Freedom "Untraceable" privacy system from ZeroKnowledge

    1on1 Secure Mail The free-to-use service that requires the use of a sizable e-mail Windows PC client, which may be downloaded from the site or obtained on CD.

    Mutt a pgp-aware mailer

    SUIDNet "secure IRC network"

    GPG - GNU Privacy Guard Download GPG which uses only free algorithms, and conforming to the OpenPGP standard

    PGP Sites #fix

    GPG - GNU Privacy Guard Download GPG which uses only free algorithms, and conforming to the OpenPGP standard

    Project Aegypten (Free Software Sphinx-Clients) for Linux "The Sphinx project launched by German authorities aims to improve secure email exchange... Proprietary products are already on the way, but with the project ?gypten there is now also a Free Software solution going to be realized for popular mail user agents (sphinx-enabling KMail and mutt are essential goals)."

    Encrypting your Disks with Linux Doobee. R. Tzeck

    PPDD requires recompiling (patching) the Linux kernel to allow strong encryption and a special device. Good documentation.

    TCFS involves the running of a daemon which exports an encrypted filesystem as an NFS share.

    Crypto Kernel Patch a patch for any given Linux kernel to make the loopback device use encryption algorithms.

    Steganography

    Outguess Steganography

    National Institute of Standards and Technology NIST is an agency of the U.S. Commerce Department's Technology Administration

    NCSA

    National Infrastructure Protection U.S. Department of Homeland Security

    The Critical Infrastructure Assurance Office (CIAO) moved to the U.S. Department of Homeland Security

    Internet Security Alliance a non-profit collaboration between EIA and Carnegie Mellon's CERT Coordination Center (CERT/CC), with a diverse and international membership

    ETSI Telecom Standards

    CERT a center of Internet security expertise

     

    RSA Security "the most trusted name in e-security"

    RSA Security Incorporated owned key encryption patents (US) which expired September 26th 2000.

    Other

    Speak Free Secure fully encrypted Chat Program

    Crypto-Central SHA algorithm MD5 etc. Delphi: Advanced encryption Components

    Biometrics

    Biometrics A Journal of the International Biometric Society

    Quantum physics cryptography

    NTT


      toc   scroll    txt   pdf   pdf    odt    A-Z  Document Manifest   home 
    << previous TOC next >>
    < ^ >

    Lex Mercatoria -->

    ( International Trade/Commercial Law & e-Commerce Monitor )

    W3 since October 3 1993
    1993 - 2010

    started @The University of Tromsø, Norway, 1993
    hosted by The University of Oslo, Norway, since 1998
    in fellowship with The Institute of International Commercial Law,
    Pace University, White Plains, New York, U.S.A.

    Disclaimer!

    © 

    Ralph Amissah




    Lex Mercatoria