Cryptology  is the study of the hidden word. It is an essential  technology in times  of war and has been in existence for thousands of  years. The strategic  positioning of troops is both a logistical  challenge as well as a  challenge from the perspective of information  theory, since command and  control information is subject to  interception. It may be argued that  cryptography has always had a dark  side, since an enemy that uses it  effectively will be able to conceal  future enemy troop movements and  other valuable information from allied  forces. However, Malicious  Cryptography digs much deeper into the  dual-edged nature of  cryptography. It shows how modern cryptographic  paradigms and tools,  including asymmetric cryptography, pseudorandom  generators, reduction  arguments, the random oracle model, etc. can in  fact be used to degrade  system security. The book details advanced  computer viruses, worms, and  Trojan horse programs that mount  unprecedented attacks against their  hosts. In short, it provides a  glimpse of the future of information  warfare, and also covers many of  the tools that can be used to guard  against these advanced threats to  computing environments.
![download[4]](http://farm5.static.flickr.com/4042/4278913170_e7973277d8_o.png)







 



 
1 komentar:
good i like hacking
follow back to my blog
http://powerindolink.blogspot.com/
Posting Komentar