e-security · e-security 1. cryptography fundamentals. 2. symmetric key encryption. 3. hashing and...
TRANSCRIPT
E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity
Disclaimer
• Encryptionworksgreat,untilitdoesn't.• Encryptionworksgreat,aslongasnoonemakesamistake.
• Encryptionworksgreat,unlesssomethinggoeswrong.
• Encryptionworksgreat,aslongaseverythingworksright.
Module Delivery Website
esecurityworkspace.slack.com
@billatnapier
github.com/billbuchanan/esecurity
Overleaf
asecuritysite.com
youtube.com
Module Delivery Website
github.com/billbuchanan/esecurity
Overleafyoutube.com
Lectures/LabDemos Courseworksubmission
Labs
Draft TimetableWebsite
Overview
1.FundamentalsTraditionalCiphers. Key-basedEncryption.EncodingMethods. FrequencyAnalysis. GCD. RandomNumbers. PrimeNumbers.BigIntegers. EncryptionOperators(MOD,XORandShift). ProfBillBuchananOBE https://asecuritysite.com/encryption
2.SymmetricKeyBasics BlockorStream? SecretKeyMethodsSaltingAES 3DESChaCha20/Poly1305 KeyEntropyProfBillBuchananOBE https://asecuritysite.com/encryption
3.HashingandMAC HashingMethods. Cracking. TypicalMethods:MD5,SHA-1,SHA-3,LM,Bcrypt,PBKDF2HashedPasswords. TimedOneTimePasswords. MessageAuthenticationCodes(MACs). ProfBillBuchananOBE https://asecuritysite.com/encryption
4.AsymmetricKeyPrinciples.RSA. EllipticCurve. UsingPrivateKeytoAuthenticate. PGP:SignedEmail. ProfBillBuchananOBE https://asecuritysite.com/encryption
5.KeyExchangePrinciples.Diffie-Hellman(DH). Passingthesecretkeywithkeyexchange.EllipticCurveDiffie-Hellman(ECDH)ProfBillBuchananOBE https://asecuritysite.com/encryption
6.TrustandDigitalCertificates Principles.TrustInfrastructures. PKIInfrastructure. CreatingSignedCertificates.Signatures(ECDSA,Hashed-based). ProfBillBuchananOBE https://asecuritysite.com/encryption
7.TunnellingSSL/TLS.Keygeneration/keyexchange.SSH.IPSec.ProfBillBuchananOBE https://asecuritysite.com/encryption
8.Blockchain&Cryptocurrencies Principles.Bitcoin.Ethereum. SmartContracts. ProfBillBuchananOBE https://asecuritysite.com/encryption
9.FutureCryptoZeroknowledgeproof.Homomorphicencryption.Light-weightcrypto.Quantum-robustcryptography. ProfBillBuchananOBE https://asecuritysite.com/encryption
E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity