I hear you. What do I do with all this stuff? Encryption is simple in concept (only the good guys can read your message), but devilish in the details. Here's a simple set of worked examples which illustrate some of the ways you can use JavaScrypt to protect your privacy. These examples open an auxiliary browser window in which various JavaScrypt components are demonstrated. Please use the buttons in this page exclusively; pressing the buttons in the popped-up window may confuse the sequencing of the example.
Crypto-folk usually couch their examples in terms of messages sent between the virtuous “Alice” and “Bob”, who wish to avoid them being intercepted and read by the nefarious “Eve”. I'll follow that convention here, so let's join Alice and Bob as they hatch a plot.
This set of worked examples only scratches the surface of what you can do with JavaScrypt which, in itself, is but a simple and limited implementation of a cryptographic system. To better understand JavaScrypt, please visit the pages below, all of which contain embedded documentation which explains the options available to you.
If you wish to dive deeper into the murky waters of cryptography, there are a multitude of references you can consult. An excellent starting point, containing a bibliography which cites essential works for further exploration, is Ferguson and Schneier's Practical Cryptography.
by John Walker December, 2005 Updated: March, 2018 |
|
This document is in the public domain.