For Training Resources See:
Do Mention PrivacyCrypt in Correspondence
Welcome to The PrivacyCrypt. Here you will find a variety of information and resources to assist with your cryptographic implementation. This includes several easy to use and downloadable toolkits.
Hash algorithms are fundament to many cryptographic applications. Although widely associated with digital signature technology, the hash algorithm has a range of other uses. SHA-1 and MD5 are amongst the most widely known, trusted and used. When utilised with a password (the HMAC version), the potential uses of these algorithms extends further. We recommend The Secure Hash Algorithm Directory
RSA & DES
Do you need a comprehensive RSA cryptography toolkit... with or without DES functionality? Do you need a DES toolkit?
Our cryptography toolkits are distinctive through their 'ease of use' approach and comprehensive functionality. Furthermore... they are not just shipped and forgotten. We also provide a unique supporting product to help implementation and testing (also provided as a demo - see below).
If you want to build a serious cryptography solution, this is your first step!
Are you seeking expert cryptographic consultancy and help? Aaben Kryptografi are leading crypto consultants and developers.
TRAINING, EDUCATION AND RESOURCES
The Cryptography Management Kit comprises a number of resources designed help you understand and implement cryptography. It includes guidebooks, audit checklists, presentations, an FAQ and a library of source code (3DES, RSA, MD5 and SHA-1). It is described full on its own web site: Cryptography
SUGGESTED GENERAL SECURITY LINKS
For security policies, embracing cryptography, we recommend: The RUsecure Interactive Security Policies. For contingency planning, we recommend The Contingency Planning and Disaster Recovery Guide.
RSA and DES Cryptography Toolkits. A Cryptography Introduction.