Tenzer T. Super Secreto. The Third Epoch of Cryptography...for Everyone 2022

Download Download Torrent Opens in your torrent client (e.g. qBittorrent)
Category Other
Size0.01 kB
Added1 year ago (2025-03-10 23:38:39)
Health
Dead0/0
Info HashC5A3C201C0BFF0E68A45F0B52177A57D1E1A6F3F
Peers Updated11 hours ago (2026-03-24 02:58:31)

Report Torrent

0 / 300

Description


The global crisis of Privacy in the 21st century also includes discussions about the right to encryption and restrictions on so-called end-to-end encryption. In order to communicate confidentially and secure against eavesdropping, simple and practical encryption is required for everyone.
But how can it be available to everyone? The magic of replacing legible characters with other apparently random and therefore illegible characters had been almost religious for centuries: only those initiated into the invention of a secret language could crack the messages. Encryption remained Super Secreto - Top Secret - Streng Geheim!
In the age of smartphone and pocket computers, it is now available to everyone: ever more sophisticated math calculates the so-called cipher text with corresponding keys in our messengers. Both keys and encrypted text used to have to be transmitted to the recipient. In today's Epoch of Cryptography, the transmission of the keys is no longer necessary: The risky transport route for the keys can even be omitted!
From the fascination of how Cryptography became abstinent in the transmission of keys - what effect it has on the desire of state agencies for secondary keys - and how multiple and exponential encryption makes resistant against the decryption-attempts of super-quantum-computers...
... tells Theo Tenzer in this exciting political, technical and socially relevant innovation and science portrait on the Third Epoch of Cryptography.
Preface: Regarding the global crisis of Privacy - The awakening of encryption and its way into the Third Epoch of Cryptography
Fear-free, confidential and secure – Does Democracy need the Right to Encrypt?
The first act: Main role of the European parliamentarians
The second act: Big Five & Five Eyes - Main roles of more than five (secret) agents
The third act: Main role of novella
The fourth act: Nobody intends to monitor: On the crisis of Privacy in the 21st century
The fifth act: Apple's Falls - create reality through technological power as fifth state power after legislative, judiciary, executive and the media
26 Shades of Grey - The search for hidden multi-encryption in Steganography
We play Halma: with the null cipher
Thanks to the stencil filter: I can see what you cannot see!
The Bacon‘s Cipher: Change instead of illusion
Hiding and Mixing by Transformation: The XOR Function
Deniable cipher text: A new direction of research or just a salted message?
With learning curves: Back to the future of a new WhatsApp?
The sixth act: Main role of teachers
The seventh act: Main role Europol and the police officers
The eighth act: Main role John Doe – Trust is good, encryption is better
The nineth act: Main role WhatsApp, a deceased canary and Captain L.
The tenth act: The discovery of innovative alternatives
Democratization of open-source encryption: A magnificent spectacle of only mathematics?
My kick-off: How do I personally approach the subject of encryption as a learner?
Historical beginnings and basics of Cryptography
From Caesar to Enigma to AES: The symmetric encryption
A special case: the one-time pad (OTP)
Three-dimensional mixing as a thought model in Cube Encryption
Asymmetric encryption
GPG (GNU Privacy Guard)
S/MIME ●
Hash-functions, certificates and signatures: SHA, Argon2 & Co.
The Third Epoch of Cryptography: An age for multi-encryption, exponential encryption & quantum-secure encryption?
Departure and farewell: No Longer Secure
Quantum-computers and their superior breakthrough into a new Epoch
Multi-encryption: A cocktail at the bar?
Exponential encryption with the Echo-protocol in the network of graphs
McEliece & NTRU: A new life cycle with secure algorithms?!
Transformation of Cryptography: The key transport problem is solved
Key exchanges over DHM, REPLEO, EPKS or AutoCrypt?
Cryptographic Calling: from Forward Secrecy to Instant Perfect Forward Secrecy (IPFS)
Derivative Cryptography: Secret Stream Keys derived from the Socialist Millionaire Protocol (SMP)
Derivative Cryptography: Juggerknaut Keys
Free of knowledge in the Ali Baba Cave
Automated freedom of interaction and other perspectives on Zero- Knowledge proofs for further programming in Cryptography
Digital and cryptographic sovereignty: National, personal and entrepreneurial
Apps, programs and tools – with which learners learn, to become Encryption Master No. 1
Hard disk encryption with Veracrypt
8.2 Smoke Crypto Chat: Mobile McEliece-Messenger
Spot-On – Well-known suite for encryption
Rosetta-Crypto-Pad – With conversions to a conversation
GoldBug Messenger – Show us your GUI
Delta-Chat: POPTASTIC popular
Silence - A SMS-App with End-to-End-Encryption
Conversations App: The old dinosaur in the moult?
Hacker’s Keyboard: Prevent taps in plain text
Federation without accounts: Echo Chat Server & XMPP Server & Matrix Server & Co
Netcat & Socat: Terminal-commands as Telecommunication system?
RetroShare: What was Turtle Hopping again?
Get four mailboxes from friends without human number identification: Institution, Care-Of, Ozone and BitMessage
In the invisible DHT-network with Briar
Encrypted File-Sharing: Freenet & Offsystem
OnionShare – Transfer without chat
Websearch and P2P-URL-Sharing with YaCy & Spot-On
Web browsing with Dooble, Iron and a Cookie-Washer
Tor Browser: Disguise the IP address
A network with a perspective for surfing: Hello Echo…
I2P Network: Invisible in the mix network
If you can do Unix, you can do GNUnet
OpenVPN – an established tunnel to the peer?
Checkpoint CryptPad
OpenStego – I don't see anything that you can see
Tails – Amnesia at the Kiosk
Mumble Audio as well Jitsi, Nextcloud and BigBlueButton Video Chat
Telegram, Threema and Wire
Mastodon's decentral Chat-Servernet
Public enemies No. 1: Cash and microphone-free rooms prevent glass people
Cryptographic Cafeteria
Interoperability, Congruence and Interconnectivity of Scottish Eggs
Interoperability: not only technically a hopeless endeavor?
Big-7-Study: Open-source Messenger in comparison
Messenger Scorecards: For the completeness of cryptographic criteria
Possible recommendations for the standardization and interoperability of messengers
Technical outlook: The coat of the Scottish egg - State servers as an overlay network?
Social Outlook: With a No-Plaintext-Strategy into the Dilemma of an encrypted society?
Index of Figures
Glossary

×