summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--etc/index.php21
-rw-r--r--index.php3
-rw-r--r--music/index.php23
-rw-r--r--photography/index.php21
-rw-r--r--programming/index.php21
-rw-r--r--writing/cryptography.php94
-rw-r--r--writing/index.php11
7 files changed, 90 insertions, 104 deletions
diff --git a/etc/index.php b/etc/index.php
index fd6e3c1..2e0b8ef 100644
--- a/etc/index.php
+++ b/etc/index.php
@@ -1,12 +1,9 @@
-<head>
- <link rel="stylesheet" href="/style.css">
- <link rel="icon" type="image/x-icon" href="/favicon.ico">
-</head>
-
-<body>
- <div class="contentpane">
- <h1>Etc | <a class="backbutton" href="../">[Back]</a></h1>
- <p>There's nothing here.
- </p>
- </div>
-</body> \ No newline at end of file
+<?php
+$title = "Etc";
+require($_SERVER["DOCUMENT_ROOT"] . "/head.php");
+require($_SERVER["DOCUMENT_ROOT"] . "/header.php");
+?>
+<p>
+ There's nothing here.
+</p>
+<?php require($_SERVER["DOCUMENT_ROOT"] . "/footer.php"); ?> \ No newline at end of file
diff --git a/index.php b/index.php
index 4bc28fb..5ebbe56 100644
--- a/index.php
+++ b/index.php
@@ -3,7 +3,8 @@ $title = "Hello, I'm Kai!";
require($_SERVER["DOCUMENT_ROOT"] . "/head.php");
require($_SERVER["DOCUMENT_ROOT"] . "/header.php");
?>
-<p>This is my Web site for cool things, like my programming, music, writing, photography, and anything else I
+<p>
+ This is my Web site for cool things, like my programming, music, writing, photography, and anything else I
think of.
I'm a social sciences student at UVic, though I'm also passionate about technology. I also have another
website at
diff --git a/music/index.php b/music/index.php
index e4bacdb..bd411c5 100644
--- a/music/index.php
+++ b/music/index.php
@@ -1,13 +1,10 @@
-<head>
- <link rel="stylesheet" href="/style.css">
- <link rel="icon" type="image/x-icon" href="/favicon.ico">
-</head>
-
-<body>
- <div class="contentpane">
- <h1>Music | <a class="backbutton" href="../">[Back]</a></h1>
- <p>I haven't recorded anything yet. If you like jazz piano improv, you could check back a little later and there
- might be some here.
- </p>
- </div>
-</body> \ No newline at end of file
+<?php
+$title = "Music";
+require($_SERVER["DOCUMENT_ROOT"] . "/head.php");
+require($_SERVER["DOCUMENT_ROOT"] . "/header.php");
+?>
+<p>
+ I haven't recorded anything yet. If you like jazz piano improv, you could check back a little later and there
+ might be some here.
+</p>
+<?php require($_SERVER["DOCUMENT_ROOT"] . "/footer.php"); ?> \ No newline at end of file
diff --git a/photography/index.php b/photography/index.php
index be57783..07d4655 100644
--- a/photography/index.php
+++ b/photography/index.php
@@ -1,12 +1,9 @@
-<head>
- <link rel="stylesheet" href="/style.css">
- <link rel="icon" type="image/x-icon" href="/favicon.ico">
-</head>
-
-<body>
- <div class="contentpane">
- <h1>Photography | <a class="backbutton" href="../">[Back]</a></h1>
- <p>There's nothing here, yet.
- </p>
- </div>
-</body> \ No newline at end of file
+<?php
+$title = "Photography";
+require($_SERVER["DOCUMENT_ROOT"] . "/head.php");
+require($_SERVER["DOCUMENT_ROOT"] . "/header.php");
+?>
+<p>
+ There's nothing here, yet.
+</p>
+<?php require($_SERVER["DOCUMENT_ROOT"] . "/footer.php"); ?> \ No newline at end of file
diff --git a/programming/index.php b/programming/index.php
index 86b2be2..88d4f6c 100644
--- a/programming/index.php
+++ b/programming/index.php
@@ -1,12 +1,9 @@
-<head>
- <link rel="stylesheet" href="/style.css">
- <link rel="icon" type="image/x-icon" href="/favicon.ico">
-</head>
-
-<body>
- <div class="contentpane">
- <h1>Programming | <a class="backbutton" href="../">[Back]</a></h1>
- <p>There's nothing here, yet, but some things I have programmed are available on github.com/kaistevenson.
- </p>
- </div>
-</body> \ No newline at end of file
+<?php
+$title = "Programming";
+require($_SERVER["DOCUMENT_ROOT"] . "/head.php");
+require($_SERVER["DOCUMENT_ROOT"] . "/header.php");
+?>
+<p>
+ There's nothing here, yet, but you can see some of my code at github.com/kaistevenson
+</p>
+<?php require($_SERVER["DOCUMENT_ROOT"] . "/footer.php"); ?> \ No newline at end of file
diff --git a/writing/cryptography.php b/writing/cryptography.php
index 7fb73c0..6c36572 100644
--- a/writing/cryptography.php
+++ b/writing/cryptography.php
@@ -1,49 +1,45 @@
-<head>
- <link rel="stylesheet" href="/style.css">
- <link rel="icon" type="image/x-icon" href="/favicon.ico">
-</head>
-
-<body>
- <div class="contentpane">
- <h1>Principles of Crytography for Data Security | <a class="backbutton" href=".">[Back]</a></h1>
- <p>As the amount of life spent online continues to increase, a great deal of private information is naturally
- being transmitted: banking details, medical records, business correspondences. Where once these exchanges of
- data would have occured between a small set of individuals in a shared space, they now happen between
- continents, through hundreds of servers and over complex network infrastructures. It is a system that cannot
- be fully accounted for by any individual, and so the means of transmission are insecure--much like having a
- letter transmitted by a series of couriers, the data is liable to be intercepted or modified. And so both
- parties in the exchange take on a risk that may prohibit especially critical data from being sent.
- Cryptography is the study of data obfuscation--a means of making a message readable only by some. It is the
- answer to the question "when the means of transmission cannot be trusted, how can information be conveyed
- securely?</p>
- <p>There are two classes of encryption: symmetric and asymmetric. Symmetric encryption allows a message to be
- encoded and decoded with the same piece of information, or key. The ancient Caesar cipher is an example of
- this; an arbitrary number acting as the key was agreed upon by both parties, and every letter in the message
- was shifted through the alphabet by that amount. It could easily be decoded by anyone who knew the key by
- simply shifting the letters backward through the alphabet. Simple algorithms such as the Caesar cipher are
- vulnerable to various attacks due to the patterns that they create in the ciphertext. A given letter may
- always be encoded in the same way, meaning that the key could be compromised if the attacker gained access
- to the plaintext and ciphertext forms of the same message. And a message could be decrypted without the key
- by recognizing repeated patterns in the ciphertext representing common words. More advanced symmetric
- encryption methods--like the Advanced Encryption Standard (AES) algorithm, developed for the US National
- Institute of Standards and Technologies--disrupt patterns in the message to prevent these types of attacks.
- </p>
- <p>Symmetric encryption is an imperfect solution in the internet age. Because it requires both parties to know
- the same secret key, those parties must have a secure form of communication already established. In the days
- of Caesar, this key exchange could be performed confidentially by two individuals in close proximity. When
- encryption is used on the internet, it cannot be assumed that the communicating parties will have had any
- physical interactions--and it would be impractical to expect every new customer of an online banking service
- to perform a physical key exchange. Asymmetric encryption solves this problem by removing the key exchange.
- Instead of encrypting and decrypting a message with the same key, an asymmetric encryption algorithm has a
- keypair, comprising a public key, used for encrypting a message, and a private key, used for decrypting a
- message. The keys are so named because the private key is never shared, while the public key can be
- broadcast widely. </p>
- <p>Typically, it demands more processing power to encrypt and decrypt messages with an asymmetric encryption
- implementation than a comparable symmetric one. For this reason, it is desirable to use symmetric encryption
- for most communications. An asymmetric implementation such as the Rivest--Shamir--Adleman (RSA) system is
- used to perform the key exchange. One of the devices will broadcast its public RSA key to the other, which
- will respond by generating an AES key, encrypting it with that RSA key, and returning it. This method of key
- exchange is secure, even if every network packet is intercepted. Once the devices share an AES key, they can
- communicate with the more efficient symmetric encryption method.</p>
- </div>
-</body> \ No newline at end of file
+<?php
+$title = "Principles of Crytography for Data Security";
+require($_SERVER["DOCUMENT_ROOT"] . "/head.php");
+require($_SERVER["DOCUMENT_ROOT"] . "/header.php");
+?>
+<p>As the amount of life spent online continues to increase, a great deal of private information is naturally
+ being transmitted: banking details, medical records, business correspondences. Where once these exchanges of
+ data would have occured between a small set of individuals in a shared space, they now happen between
+ continents, through hundreds of servers and over complex network infrastructures. It is a system that cannot
+ be fully accounted for by any individual, and so the means of transmission are insecure--much like having a
+ letter transmitted by a series of couriers, the data is liable to be intercepted or modified. And so both
+ parties in the exchange take on a risk that may prohibit especially critical data from being sent.
+ Cryptography is the study of data obfuscation--a means of making a message readable only by some. It is the
+ answer to the question "when the means of transmission cannot be trusted, how can information be conveyed
+ securely?</p>
+<p>There are two classes of encryption: symmetric and asymmetric. Symmetric encryption allows a message to be
+ encoded and decoded with the same piece of information, or key. The ancient Caesar cipher is an example of
+ this; an arbitrary number acting as the key was agreed upon by both parties, and every letter in the message
+ was shifted through the alphabet by that amount. It could easily be decoded by anyone who knew the key by
+ simply shifting the letters backward through the alphabet. Simple algorithms such as the Caesar cipher are
+ vulnerable to various attacks due to the patterns that they create in the ciphertext. A given letter may
+ always be encoded in the same way, meaning that the key could be compromised if the attacker gained access
+ to the plaintext and ciphertext forms of the same message. And a message could be decrypted without the key
+ by recognizing repeated patterns in the ciphertext representing common words. More advanced symmetric
+ encryption methods--like the Advanced Encryption Standard (AES) algorithm, developed for the US National
+ Institute of Standards and Technologies--disrupt patterns in the message to prevent these types of attacks.
+</p>
+<p>Symmetric encryption is an imperfect solution in the internet age. Because it requires both parties to know
+ the same secret key, those parties must have a secure form of communication already established. In the days
+ of Caesar, this key exchange could be performed confidentially by two individuals in close proximity. When
+ encryption is used on the internet, it cannot be assumed that the communicating parties will have had any
+ physical interactions--and it would be impractical to expect every new customer of an online banking service
+ to perform a physical key exchange. Asymmetric encryption solves this problem by removing the key exchange.
+ Instead of encrypting and decrypting a message with the same key, an asymmetric encryption algorithm has a
+ keypair, comprising a public key, used for encrypting a message, and a private key, used for decrypting a
+ message. The keys are so named because the private key is never shared, while the public key can be
+ broadcast widely. </p>
+<p>Typically, it demands more processing power to encrypt and decrypt messages with an asymmetric encryption
+ implementation than a comparable symmetric one. For this reason, it is desirable to use symmetric encryption
+ for most communications. An asymmetric implementation such as the Rivest--Shamir--Adleman (RSA) system is
+ used to perform the key exchange. One of the devices will broadcast its public RSA key to the other, which
+ will respond by generating an AES key, encrypting it with that RSA key, and returning it. This method of key
+ exchange is secure, even if every network packet is intercepted. Once the devices share an AES key, they can
+ communicate with the more efficient symmetric encryption method.</p>
+<?php require($_SERVER["DOCUMENT_ROOT"] . "/footer.php"); ?> \ No newline at end of file
diff --git a/writing/index.php b/writing/index.php
index aab6642..7f6e165 100644
--- a/writing/index.php
+++ b/writing/index.php
@@ -1,9 +1,10 @@
<?php
-$title = "Hello, I'm Kai!";
-include($_SERVER["DOCUMENT_ROOT"] . "/head.php");
-include($_SERVER["DOCUMENT_ROOT"] . "/header.php");
+$title = "Writing";
+require($_SERVER["DOCUMENT_ROOT"] . "/head.php");
+require($_SERVER["DOCUMENT_ROOT"] . "/header.php");
?>
-<p>This is the index page for my writing. Obviously, if you follow the links below, you can read things I've
+<p>
+ This is the index page for my writing. Obviously, if you follow the links below, you can read things I've
written.
Whether or not you want to do that is up to you.
</p>
@@ -12,4 +13,4 @@ include($_SERVER["DOCUMENT_ROOT"] . "/header.php");
<h2><a href="cryptography.php">Cryptography</a> /* Keep yourself safe */</h2>
</li>
</ul>
-<?php include($_SERVER["DOCUMENT_ROOT"] . "/footer.php"); ?> \ No newline at end of file
+<?php require($_SERVER["DOCUMENT_ROOT"] . "/footer.php"); ?> \ No newline at end of file