10-30-2001
<A HREF="http://www1.fatbrain.com/asp/bookinfo/bookinfo.asp?theisbn=1565921488&vm=">Practical Unix & Internet Security<BR>
<IMG SRC="http://a1204.g.akamai.net/7/1204/1401/00082717011/images.barnesandnoble.com/images/1820000/1823113.gif"></A>
<BR>
is a good one, although it is now a little dated (2nd edition published 1995), the discussions are still relevant.
Anything by Bruce Schneier is also very good. His monthly <A HREF="http://www.counterpane.com/crypto-gram.html">Cryptogram</A> email newsletter is recommended reading for anyone interested in security.
6 More Discussions You Might Find Interesting
1. Cybersecurity
Hello peoples, I could really use some expert advice.
Currently I am starting my curriculumn in CompSci. I am very interested in Unix, Shell Programming and Network Security. I would Like to work in Compusec/Infosec........fight system vulnerability for my future employer.
What Cert would you... (3 Replies)
Discussion started by: pacman-iac
3 Replies
2. Cybersecurity
Hi, I'm currently in a Technical Writing class and I decided to do a report on network security. I need a primary source for this and decided that I would poll you fine people on your prefrences in security related software to get said primary source.
1. What webserver would you consider to be... (1 Reply)
Discussion started by: TYLERofDOOM
1 Replies
3. Shell Programming and Scripting
Hi,
I am about to take up task of shell scripting in Network Security. Just started on job. But everything looks new NIS etc..
I tried googling to find systematic explanation of network security terms and how to script for that. But was unable to find. Could anyone of you please direct me to... (1 Reply)
Discussion started by: tostay2003
1 Replies
4. UNIX for Advanced & Expert Users
I am going to take up a position in Data & Network Security.
I would need to write network shell scripts doing the following task:
Going to around 2000 servers and findout which groups has access to each servers and which ids are there in each group that has access.
I need to implement... (1 Reply)
Discussion started by: pinnacle
1 Replies
5. What is on Your Mind?
Hii i want to make career in networking and i m new in this field could u plz help me what should i do (2 Replies)
Discussion started by: pawan_kumar
2 Replies
6. Cybersecurity
Hi
I was wondering if someone could give some tips about network security postgraduate courses and/or certifications .
I know that is a generic question and a wide area, but that's the problem, the net is full of books, courses, or whatever.
My goal is to find a good course (or book) that... (0 Replies)
Discussion started by: Dedalus
0 Replies
LEARN ABOUT CENTOS
crypt::des
DES(3) User Contributed Perl Documentation DES(3)
NAME
Crypt::DES - Perl DES encryption module
SYNOPSIS
use Crypt::DES;
DESCRIPTION
The module implements the Crypt::CBC interface, which has the following methods
blocksize =item keysize =item encrypt =item decrypt
FUNCTIONS
blocksize
Returns the size (in bytes) of the block cipher.
keysize
Returns the size (in bytes) of the key. Optimal size is 8 bytes.
new
my $cipher = new Crypt::DES $key;
This creates a new Crypt::DES BlockCipher object, using $key, where $key is a key of "keysize()" bytes.
encrypt
my $cipher = new Crypt::DES $key;
my $ciphertext = $cipher->encrypt($plaintext);
This function encrypts $plaintext and returns the $ciphertext where $plaintext and $ciphertext should be of "blocksize()" bytes.
decrypt
my $cipher = new Crypt::DES $key;
my $plaintext = $cipher->decrypt($ciphertext);
This function decrypts $ciphertext and returns the $plaintext where $plaintext and $ciphertext should be of "blocksize()" bytes.
EXAMPLE
my $key = pack("H16", "0123456789ABCDEF");
my $cipher = new Crypt::DES $key;
my $ciphertext = $cipher->encrypt("plaintex"); # NB - 8 bytes
print unpack("H16", $ciphertext), "
";
NOTES
Do note that DES only uses 8 byte keys and only works on 8 byte data blocks. If you're intending to encrypt larger blocks or entire files,
please use Crypt::CBC in conjunction with this module. See the Crypt::CBC documentation for proper syntax and use.
Also note that the DES algorithm is, by today's standard, weak encryption. Crypt::Blowfish is highly recommended if you're interested in
using strong encryption and a faster algorithm.
SEE ALSO
Crypt::Blowfish Crypt::IDEA
Bruce Schneier, Applied Cryptography, 1995, Second Edition, published by John Wiley & Sons, Inc.
COPYRIGHT
The implementation of the DES algorithm was developed by, and is copyright of, Eric Young (eay@mincom.oz.au). Other parts of the perl
extension and module are copyright of Systemics Ltd ( http://www.systemics.com/ ). Cross-platform work and packaging for single algorithm
distribution is copyright of W3Works, LLC.
MAINTAINER
This single-algorithm package and cross-platform code is maintained by Dave Paris <amused@pobox.com>.
perl v5.16.3 2005-12-08 DES(3)